exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 271 discussion

Actual exam question from CompTIA's SY0-601
Question #: 271
Topic #: 1
[All SY0-601 Questions]

The database administration team is requesting guidance for a secure solution that will ensure confidentiality of cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs. Which of the following is the BEST solution to meet the requirement?

  • A. Tokenization
  • B. Masking
  • C. Full disk encryption
  • D. Mirroring
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Imanism
Highly Voted 2 years, 7 months ago
Selected Answer: A
tokenization is mainly used to protect data at rest whereas masking is used to protect data in use.
upvoted 22 times
...
P_man
Highly Voted 2 years, 3 months ago
Tokenization and PCI-DSS for all credit card questions....
upvoted 19 times
...
nickkerr
Most Recent 1 year, 4 months ago
hey guys, its me
upvoted 1 times
...
klinkklonk
1 year, 5 months ago
Selected Answer: A
TOKENIZATION Masking only obfuscates part of the data.
upvoted 3 times
...
cannon
1 year, 5 months ago
Selected Answer: A
Guys, ask a DBA. They will tell you Masking only obscures the data that's presented, IE when it's presented. Masking does not encrypt or protect the actual data. The answer has to be Tokenization.
upvoted 1 times
...
MartyByrde
1 year, 6 months ago
I'm glad hashing is not a answer choice
upvoted 3 times
...
ApplebeesWaiter1122
1 year, 12 months ago
Selected Answer: A
Tokenization is a data protection technique that involves replacing sensitive data with unique tokens. The sensitive data is securely stored in a separate tokenization system or vault. The tokens have no meaningful correlation to the original data and are useless if obtained by an unauthorized party. In the event of a data breach, the compromised tokens do not expose the actual sensitive data, ensuring its confidentiality.
upvoted 5 times
...
JSOG
2 years, 6 months ago
Selected Answer: A
A for me
upvoted 2 times
...
carpathia
2 years, 7 months ago
Selected Answer: A
"While both tokenization and masking are great techniques used to protect sensitive data, tokenization is mainly used to protect data at rest whereas masking is used to protect data in use." http://www.differencebetween.net/technology/difference-between-tokenization-and-masking/#ixzz7kbfKgsdk
upvoted 7 times
...
comeragh
2 years, 7 months ago
Selected Answer: A
Agree with A being correct answer here
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...