exam questions

Exam DA0-001 All Questions

View all questions & answers for the DA0-001 exam

Exam DA0-001 topic 1 question 4 discussion

Actual exam question from CompTIA's DA0-001
Question #: 4
Topic #: 1
[All DA0-001 Questions]

Which of the following actions should be taken when transmitting data to mitigate the chance of a data leak occurring? (Choose two.)

  • A. Data identification
  • B. Data processing
  • C. Data reporting
  • D. Data encryption
  • E. Data masking
  • F. Fata removal
Show Suggested Answer Hide Answer
Suggested Answer: DE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ronniehaang
Highly Voted 9 months, 1 week ago
Selected Answer: DE
D. Data encryption E. Data masking Data encryption involves transforming the data into an unreadable format so that it cannot be understood without the appropriate decryption key. This protects the data from being intercepted or viewed by unauthorized parties during transmission. Data masking involves obscuring sensitive data elements by replacing them with non-sensitive values. This allows the data to be used for testing, development, and reporting purposes without compromising its confidentiality. Data masking also helps to mitigate the risk of data leaks, since the sensitive information is not accessible to unauthorized parties. By using both encryption and masking, the chance of a data leak occurring during transmission can be significantly reduced, as the data is protected both in transit and at rest.
upvoted 5 times
...
daksa
Most Recent 2 months, 1 week ago
Selected Answer: DE
since it says to choose two, both D and E are answers.
upvoted 1 times
...
CineFeX
10 months, 1 week ago
Data encryption and data masking are both methods that can be used to protect data when it is transmitted. Data encryption involves converting the data into a coded form that can only be accessed by someone with the correct decryption key. Data masking involves replacing sensitive data with fake data that looks similar, but does not reveal the actual data. These techniques can help to reduce the risk of a data leak occurring by making it more difficult for unauthorized parties to access the data. The other options are not related to data transmission and would not be effective in mitigating the risk of a data leak.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago