nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #544

CERTIFIED-IN-CYBERSECURITY Question #544: Real Exam Question with Answer & Explanation

The correct answer is C: Encryption. Encryption is a method used to protect the confidentiality of data by converting it into a format that can only be read by those with the appropriate decryption key (see the ISC2 Study Guide, Chapter 1, Module 1). For example, if a user sends an encrypted e-mail message, only the

Security Principles

Question

Which of the following is a technique used to protect the confidentiality of data?

Options

  • ADigital Signatures
  • BHashing
  • CEncryption
  • DTokenization

Explanation

Encryption is a method used to protect the confidentiality of data by converting it into a format that can only be read by those with the appropriate decryption key (see the ISC2 Study Guide, Chapter 1, Module 1). For example, if a user sends an encrypted e-mail message, only the recipient with the correct key can decrypt and read the message, ensuring the confidentiality of the information. The other options are not correct. Digital signatures are used to verify the authenticity and integrity of data and provide non- repudiation, but they do not protect the confidentiality of data. Tokenization replaces sensitive data with non-sensitive equivalents, providing a level of security, but does not ensure confidentiality because the original data is not accessible. Hashing converts data to a fixed-length output and provides data integrity by ensuring that the data has not been tampered with. However, it does not protect the confidentiality of the

Topics

#Confidentiality#Encryption#Data Protection#Security Principles

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions