CERTIFIED-IN-CYBERSECURITY · Question #544
CERTIFIED-IN-CYBERSECURITY Question #544: Real Exam Question with Answer & Explanation
The correct answer is C: Encryption. Encryption is a method used to protect the confidentiality of data by converting it into a format that can only be read by those with the appropriate decryption key (see the ISC2 Study Guide, Chapter 1, Module 1). For example, if a user sends an encrypted e-mail message, only the
Question
Which of the following is a technique used to protect the confidentiality of data?
Options
- ADigital Signatures
- BHashing
- CEncryption
- DTokenization
Explanation
Encryption is a method used to protect the confidentiality of data by converting it into a format that can only be read by those with the appropriate decryption key (see the ISC2 Study Guide, Chapter 1, Module 1). For example, if a user sends an encrypted e-mail message, only the recipient with the correct key can decrypt and read the message, ensuring the confidentiality of the information. The other options are not correct. Digital signatures are used to verify the authenticity and integrity of data and provide non- repudiation, but they do not protect the confidentiality of data. Tokenization replaces sensitive data with non-sensitive equivalents, providing a level of security, but does not ensure confidentiality because the original data is not accessible. Hashing converts data to a fixed-length output and provides data integrity by ensuring that the data has not been tampered with. However, it does not protect the confidentiality of the
Topics
Community Discussion
No community discussion yet for this question.