What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?
A) Masking
B) Anonymization
C) Tokenization
D) Obfuscation
Correct Answer:
Verified
Q316: Which of the following is the optimal
Q317: Which of the following best describes the
Q318: During the course of an audit, which
Q319: Which security concept would business continuity and
Q320: Which of the following threat types involves
Q322: Which of the following is a restriction
Q323: A UPS should have enough power to
Q324: Countermeasures for protecting cloud operations against external
Q325: The share phase of the cloud data
Q326: Which of the following jurisdictions lacks a
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents