CCSP Exam QuestionsBrowse all questions from this exam

CCSP Exam - Question 437


Data masking can be used to provide all of the following functionality, except:

Show Answer
Correct Answer: B

Data masking is a technology used to obscure specific data within a database so that sensitive information remains hidden while allowing the data to still be useful for testing or analysis purposes. Data masking does not provide authentication of privileged users. Authentication is a security measure concerned with verifying the identities of users, which is outside the scope of data masking. Therefore, among the given options, data masking cannot be used for the authentication of privileged users.

Discussion

4 comments
Sign in to comment
gjjw
May 22, 2020

how does data masking help remote access?

sans1241
Apr 21, 2021

Data masking helps secure remote access by not displaying password - strange though but this is the only reason that I can think of :D

Zeezee2
Nov 22, 2021

'D' should read "secure remote access of data", as in connecting to a resource from outside the protected network to read data which is then masked. "Secure Remote Access" is misleading in that it makes one think of VPNs and encryption.

CISSPCCSPMP
Aug 29, 2021

duplicate question

sweetykaur
Oct 10, 2024

The correct answer is D. Secure remote access. Data masking is primarily used for creating test data in sandboxed environments, authenticating privileged users, and enforcing least privilege, but it does not provide secure remote access

MaciekMTOption: B
Feb 25, 2025

Data masking is primarily used to protect sensitive data by replacing or obfuscating real values while keeping the data usable for testing, development, and security purposes. However, data masking does not handle authentication—it only controls data visibility. What Data Masking Can Do: A. Test Data in Sandboxed Environments → Creates realistic but anonymized data for safe testing. C. Enforcing Least Privilege → Ensures that users only see masked data based on their access level. D. Secure Remote Access → Helps prevent data exposure in remote environments by masking sensitive information. Why Not "Authentication of Privileged Users"? Authentication verifies who a user is (e.g., passwords, biometrics, MFA). Data masking does not verify identities; it only hides or alters data visibility.