The database administration team is requesting guidance for a secure solution that will ensure confidentiality of
cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a
sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs. Which of the
following is the BEST solution to meet the requirement?
A. Tokenization
B. Masking
C. Full disk encryption
D. Mirroring
cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a
sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs. Which of the
following is the BEST solution to meet the requirement?
A. Tokenization
B. Masking
C. Full disk encryption
D. Mirroring