A Chief Information Security Officer (CISO) is concerned developers have too much visibility into customer data. Which of the following controls should be implemented to BEST address these concerns?

A. Data masking
B. Data loss prevention
C. Data minimization
D. Data sovereignty


Answer: A. Data masking

Computer Science & Information Technology

You might also like to view...

The spa manager could learn a lot about the business and use this information to help increase sales. If the manager knows that two items are most likely to sell together in one transaction, he could ensure he has equal amounts of inventory in stock. This is known as ________

A) a query join. B) appending data C) data warehousing D) forecasting

Computer Science & Information Technology

The lock type called ____ locks transparent pixels, image pixels, and position.

a. Lock transparent pixels b. Lock image pixels c. Lock position d. Lock all

Computer Science & Information Technology

_______ displays are LCDs used on tower computers

Fill in the blank(s) with correct word

Computer Science & Information Technology

Describe block special files used in Linux.

What will be an ideal response?

Computer Science & Information Technology