nerdexam
(ISC)2(ISC)2

CISSP · Question #1128

CISSP Question #1128: Real Exam Question with Answer & Explanation

The correct answer is C: Tokenization. The method that can be deployed to protect the privacy of the user's information while maintaining the field-level configuration of the database is tokenization. Tokenization is a technique that replaces sensitive data, such as personal or financial information, with nonsensitive

Submitted by ashley.k· Mar 5, 2026Asset Security

Question

A company wants to store data related to users on an offsite server. What method can be deployed to protect the privacy of the user's information while maintaining the field-level configuration of the database?

Options

  • AEncryption
  • BEncoding
  • CTokenization
  • DHashing

Explanation

The method that can be deployed to protect the privacy of the user's information while maintaining the field-level configuration of the database is tokenization. Tokenization is a technique that replaces sensitive data, such as personal or financial information, with nonsensitive placeholders, called tokens. Tokens are randomly generated values that have no intrinsic meaning or value, and cannot be reversed or decrypted to reveal the original data. Tokens can preserve the format, length, and type of the original data, and can be stored in the same database fields as the original data. Tokenization can protect the privacy of the user's information by reducing the exposure and risk of data breaches, as the tokens are useless for the attackers who may access the database. Tokenization can also maintain the field-level configuration of the database, as the tokens can be used for the same purposes as the original data, such as processing, analysis, or reporting, without affecting the database structure or

Topics

#data privacy#tokenization#data protection#database security

Community Discussion

No community discussion yet for this question.

Full CISSP PracticeBrowse All CISSP Questions