An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to best satisfy both the CPO’s and the development team’s requirements?

QuestionsCategory: SY0-601An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to best satisfy both the CPO’s and the development team’s requirements?
Admin Staff asked 12 months ago
An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to best satisfy both the CPO's and the development team's requirements?

A. Data purge

B. Data encryption

C. Data masking

D. Data tokenization





 

Correct Answer: C

This question is in SY0-601 exam
For getting CompTIA Security+ certificate


Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.