ECCouncil 212-82 Question Answer
Andre, a security professional, was tasked with segregating the employees' names, phone numbers, and credit card numbers before sharing the database with clients. For this purpose, he implemented a deidentification technique that can replace the critical information in database fields with special characters such as asterisks (*) and hashes (#).
Which of the following techniques was employed by Andre in the above scenario?
ECCouncil 212-82 Summary
- Vendor: ECCouncil
- Product: 212-82
- Update on: Jul 31, 2025
- Questions: 161