D. Data encryption
E. Data masking
Data encryption involves transforming the data into an unreadable format so that it cannot be understood without the appropriate decryption key. This protects the data from being intercepted or viewed by unauthorized parties during transmission.
Data masking involves obscuring sensitive data elements by replacing them with non-sensitive values. This allows the data to be used for testing, development, and reporting purposes without compromising its confidentiality. Data masking also helps to mitigate the risk of data leaks, since the sensitive information is not accessible to unauthorized parties.
By using both encryption and masking, the chance of a data leak occurring during transmission can be significantly reduced, as the data is protected both in transit and at rest.
Data encryption and data masking are both methods that can be used to protect data when it is transmitted. Data encryption involves converting the data into a coded form that can only be accessed by someone with the correct decryption key. Data masking involves replacing sensitive data with fake data that looks similar, but does not reveal the actual data. These techniques can help to reduce the risk of a data leak occurring by making it more difficult for unauthorized parties to access the data. The other options are not related to data transmission and would not be effective in mitigating the risk of a data leak.
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.DA0-001 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ronniehaang
Highly Voted 9 months, 1 week agodaksa
Most Recent 2 months, 1 week agoCineFeX
10 months, 1 week ago