An organization that handles sensitive information wants to protect the information by using a reversible technology. Which of the following best satisfies this requirement?
C. Tokenization
Explanation:
Tokenization replaces sensitive data (e.g., credit card numbers, Social Security numbers) with a unique identifier (token) while storing the original data securely.
The process is reversible, meaning authorized systems can retrieve the original data when needed.
It is widely used in payment processing, healthcare, and financial services to protect sensitive information while maintaining usability.
Why Not the Other Options?
A. Hardware Security Module (HSM) → HSMs store and manage encryption keys but do not replace data with tokens.
B. Hashing Algorithm → Hashing is irreversible, making it unsuitable for cases where data needs to be retrieved.
D. Steganography → This hides data within files or images but does not securely protect sensitive information in a structured manner.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.SY0-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
test_arrow
2 months, 2 weeks ago