- (Exam Topic 4)
In which of the following scenarios is tokenization the best privacy technique to use?
Correct Answer:
C
Tokenization is a privacy technique that replaces sensitive data elements, such as credit card numbers, with non-sensitive equivalents, called tokens, that have no intrinsic or exploitable value. Tokenization can be used to enable established customers to safely store credit card information without exposing their actual card numbers to potential theft or misuse. The tokens can be used to process payments without revealing the original data456 References: CompTIA Security+ SY0-601 Certification Study Guide, Chapter 8: Implementing Secure Protocols, page 362; What is tokenization? | McKinsey; What is Tokenization? Definition and Examples | OpenText - Micro Focus; Tokenization (data security) - Wikipedia
- (Exam Topic 4)
A security analyst needs to implement security features across smartphones, laptops, and tablets. Which of the following would be the MOST effective across heterogeneous platforms?
Correct Answer:
D
MDM stands for Mobile Device Management, is software that assists in the implementation of the process of managing, monitoring, and securing several mobile devices such as tablets, smartphones, and laptops used in the organization to access the corporate information.
- (Exam Topic 2)
Which of the following documents provides guidance regarding the recommended deployment of network security systems from the manufacturer?
Correct Answer:
C
- (Exam Topic 3)
Which of the following allows for functional test data to be used in new systems for testing and training purposes to protect the real data?
Correct Answer:
B
https://ktechproducts.com/Data-mask#:~:text=Data Masking is a method of creating The main reason for applying masking to a data field is to protect data that is classified as personally
identifiable information, sensitive personal data, or commercially sensitive data. However, the data must remain usable for the purposes of undertaking valid test cycles. It must also look real and appear consistent. It is more common to have masking applied to data that is represented outside of a corporate production system. In other words, where data is needed for the purpose of application development, building program extensions and conducting various test cycles https://en.wikipedia.org/wiki/Data_masking
- (Exam Topic 1)
An administrator needs to protect user passwords and has been advised to hash the passwords. Which of the following BEST describes what the administrator is being advised to do?
Correct Answer:
D