Q:
Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?
A:
Masking
Answer:
Secure is the correct answer for the above question.
Explanation:
- When any person wants that any information is not hacked by any user then he needs to secure the information with the help of any security mechanism. This security mechanism can be of any type that facilities the user to stop the information are being hacked.
- The above question asked about the work which is needed to stop the message is being hacked. So there is a need to secure the information. so secure is the correct option while the other option is not valid because "simple, economical or verifiable" can not stop the message from accessed by the unauthorized user.
<span>The following statements are true:
1. Leased lines require little installation and maintenance expertise.
( A high service quality is offered by point-to point system)
2. Leased lines provide highly flexible bandwidth scaling.
(This Allows a Constant availability)</span>