Data masking can be used to provide all of the following functionality, except:
Data masking can be used to provide all of the following functionality, except:
Data masking is a technology used to obscure specific data within a database so that sensitive information remains hidden while allowing the data to still be useful for testing or analysis purposes. Data masking does not provide authentication of privileged users. Authentication is a security measure concerned with verifying the identities of users, which is outside the scope of data masking. Therefore, among the given options, data masking cannot be used for the authentication of privileged users.
how does data masking help remote access?
Data masking helps secure remote access by not displaying password - strange though but this is the only reason that I can think of :D
'D' should read "secure remote access of data", as in connecting to a resource from outside the protected network to read data which is then masked. "Secure Remote Access" is misleading in that it makes one think of VPNs and encryption.
duplicate question
The correct answer is D. Secure remote access. Data masking is primarily used for creating test data in sandboxed environments, authenticating privileged users, and enforcing least privilege, but it does not provide secure remote access
Data masking is primarily used to protect sensitive data by replacing or obfuscating real values while keeping the data usable for testing, development, and security purposes. However, data masking does not handle authentication—it only controls data visibility. What Data Masking Can Do: A. Test Data in Sandboxed Environments → Creates realistic but anonymized data for safe testing. C. Enforcing Least Privilege → Ensures that users only see masked data based on their access level. D. Secure Remote Access → Helps prevent data exposure in remote environments by masking sensitive information. Why Not "Authentication of Privileged Users"? Authentication verifies who a user is (e.g., passwords, biometrics, MFA). Data masking does not verify identities; it only hides or alters data visibility.