makeporngreatagain.pro
yeahporn.top
hd xxx

Practice Test 2 | Google Cloud Certified Professional Cloud Security Engineer | Dumps | Mock Test

5,304

Your company handles a lot of sensitive data. There is a need to de-identify some sensitive data like payment card details and re-identify them later for processing.

Which of the following techniques in Cloud DLP will help you meet this requirement?

A. Tokenization.
B. Date Shifting. 
C. Redaction.
D. Bucketing.

Answer:

  • Option A is CORRECT. This is also called Pseudonymization that can be used to replace sensitive data with cryptographic tokens.
  • Option B is incorrect. This is used to randomly shift dates but preserve the sequence of events and duration.
  • Option C is incorrect. This technique obfuscates sensitive data.
  • Option D is incorrect. This is used to group records into smaller buckets to reduce the risk of an attacker associating sensitive information with identifying information.

Reference:

Comments are closed, but trackbacks and pingbacks are open.

baseofporn.com https://www.opoptube.com
Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.