CSDEV
Data Masking Protocols and Techniques
Enter your Username
Please enter your username(email) before you take the quiz.
Data Masking Protocols and Techniques
Questions 1 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which data masking technique involves changing the order of the characters or numbers in the original content?
Multiple choice
Questions 2 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Data masking allows us to create a functional substitute of production data that can be used for training, testing or software development without revealing sensitive information.
True or False
Questions 3 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which challenge of data masking refers to ensuring that when a table's primary key is replaced, the new value should reflect across the database where that primary key is used?
Multiple choice
Questions 4 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Who is responsible for identifying the tables and fields that store the sensitive / confidential data?
Multiple choice
Questions 5 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
In which environment is data masking generally applied?
Multiple choice
Questions 6 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which challenge of data masking requires that the original format be followed when masking sensitive data?
Multiple choice
Questions 7 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which challenge of data masking requires that the masking technique take into account the rules applicable to the original range of values?
Multiple choice
Questions 8 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which challenge of data masking requires that the masking technique retains the gender of the names replaced in the original data?
Multiple choice
Questions 9 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Who is responsible for determining the appropriate masking technique for sensitive / confidential data identified?
Multiple choice
Questions 10 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
When masking unique data, the replacement values must also be unique.
True or False
Questions 11 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which data masking technique will show the data as 'null' when viewed by an unauthorized user?
Multiple choice
Questions 12 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which data masking technique involves replacing sensitive data with generic values that have no similar attributes to the original?
Multiple choice
Questions 13 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which data masking technique involves replacing the original data with an alias?
Multiple choice
Questions 14 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
If the veiling test reveals that the desired outcome was not achieved, the database must be restored to its original state and the masking procedure must be repeated using the same masking technique.
True or False
Questions 15 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Who is responsible for preparing scripts for masking / replacing the sensitive / confidential data identified?
Multiple choice
Questions 16 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Which data masking technique involves replacing the individual data in a table with the average value in order to reflect the data in terms of their average?
Multiple choice
Questions 17 of 17
-
Timer
0
-
Score
0
Data Masking Protocols and Techniques
Who is responsible for identifying the sensitive / confidential information that needs to be masked?
Multiple choice