____________ is a method used to hide the actual values of sensitive data by replacing them with substitutes.
- Encryption
- Hashing
- Masking
- Salting
Data masking involves replacing original data with fictional, yet realistic, data to hide sensitive information. This technique helps protect data privacy and security by ensuring that only authorized users can access real data while masking the actual values from unauthorized individuals or systems.
Loading...
Related Quiz
- What is the purpose of spike testing in performance testing?
- In role-based access control (RBAC), permissions are assigned to ____________ rather than individual users.
- In ETL processes, data validation typically involves checking for data ____________ and correctness.
- Database schema testing often involves evaluating the ____________ between different tables to ensure data consistency.
- Scenario: You are testing the scalability of a popular e-commerce website during a sale event. The website experiences a sudden surge in traffic, and the response time degrades significantly. Which type of scalability testing should you have conducted to prevent this issue?