A data analyst is tasked with sending a file containing sensitive customer information to an offsite partner. Which of the following is the most effective method to prevent the file's contents from being read if it is intercepted during transfer?
De-identify the data by masking sensitive fields before sending.
Restrict access to the file based on user roles.
Verify the file's hash after the transfer is complete.
Encrypt the file or the communication channel before transmission.
Encrypting the data in transit ensures that if the information is intercepted by an unauthorized party, it remains unreadable and confidential. This can be done by encrypting the file itself or by using a secure, encrypted communication channel like TLS or SFTP. Methods like hashing are used to verify data integrity (i.e., that the data was not altered), not to ensure confidentiality. Access controls based on user roles apply at the endpoints but do not protect data from being read by an eavesdropper during network transit. De-identifying data protects only the specific fields that are masked and may not protect the full content of the file.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are layered safeguards?
Open an interactive chat with Bash
Why is encryption important for secure data transfer?