exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 493 discussion

Actual exam question from CompTIA's SY0-701
Question #: 493
Topic #: 1
[All SY0-701 Questions]

Which of the following is an example of a data protection strategy that uses tokenization?

  • A. Encrypting databases containing sensitive data
  • B. Replacing sensitive data with surrogate values
  • C. Removing sensitive data from production systems
  • D. Hashing sensitive data in critical systems
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JThomas11068
5 months, 2 weeks ago
Selected Answer: B
Tokenization is a data protection strategy that involves replacing sensitive data with a non-sensitive placeholder, called a token. These tokens are surrogate values that have no meaningful relationship with the original sensitive data, but can still be used in a system without exposing the actual sensitive information. The original data is stored securely in a separate, protected location (often a token vault), and the tokens are used in its place in the production systems. For example, instead of storing a real credit card number, a system might store a token like "12345678", and the real credit card number would only be accessible in the secure token vault.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...