To protect sensitive data, ETL processes often implement ________ to restrict data access.

  • Compression
  • Encryption
  • Hashing
  • Masking
ETL processes commonly implement data masking to restrict access to sensitive information. Data masking involves replacing original data with fictional or pseudonymous data, safeguarding sensitive content during the process.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *