Exam SnowPro Advanced Data Engineer All QuestionsBrowse all questions from this exam
Question 29

What is a characteristic of the use of external tokenization?

    Correct Answer: D

    External tokenization allows the preservation of analytical values even after the data has been de-identified. This is due to the fact that the tokenization process substitutes sensitive data with non-sensitive identifiers (tokens) that can still retain certain properties of the original data, enabling analysis without exposing the actual sensitive information.

Discussion
prshntdxt7Option: D

**correction- changing answer to D, @Maicas you're right. D. External tokenization allows the preservation of analytical values after de-identification. External tokenization typically involves using a separate service or system to tokenize sensitive data. This method allows for the preservation of certain analytical values even after de-identification, making it possible to perform some types of analysis on the tokenized data without compromising individual identities.

MaicasOption: D

Can't be C because it says "pre-loading of UNmasked data". The correct answer is D https://docs.snowflake.com/en/user-guide/security-column-intro#benefits

stopthisnowOption: C

https://docs.snowflake.com/en/user-guide/security-column-ext-token-intro Using a tokenization provider, tokenized data is pre-loaded into Snowflake. Therefore, even without applying a masking policy to a column in a table or view, users never see the real data value. This provides enhanced data security to the most sensitive data in your organization.

prshntdxt7Option: C

option-C https://docs.snowflake.com/en/user-guide/security-column-ext-token-intro#external-tokenization-benefits "Using a tokenization provider, tokenized data is pre-loaded into Snowflake. Therefore, even without applying a masking policy to a column in a table or view, users never see the real data value. This provides enhanced data security to the most sensitive data in your organization."

Maicas

Tokenized data is protected, preventing users from seing the real value. Just the opposite of answer C, which is UNmasked data.