Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 212-82 All Questions
Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

ECCouncil Cyber Technician (CCT) 212-82 Question # 39 Topic 4 Discussion

212-82 Exam Topic 4 Question 39 Discussion:
Question #: 39
Topic #: 4

Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).

Which of the following techniques was employed by Andre in the above scenario?


A.

Tokenization


B.

Masking


C.

Hashing


D.

Bucketing


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.