ISC2 Certified Cloud Security Professional (CCSP) Practice Question

Your company plans to load a customer billing table that contains full 16-digit primary account numbers (PANs) into a public cloud data-warehouse service so data scientists can execute ad-hoc SQL analytics. Corporate policy mandates that real PAN values must never leave the on-premises environment, yet analysts still need to run queries such as grouping by the first six digits (issuer BIN) and keep the field length unchanged. Which characteristic of tokenization, when compared with conventional encryption, makes it the most suitable control for this requirement?

  • Tokenization primarily works by compressing sensitive fields, which lowers storage and bandwidth use while still allowing queries.

  • Tokens can be generated to keep the original PAN length and selected digits visible while remaining non-mathematically reversible, allowing native analytics without exposing real data.

  • Tokenization leverages homomorphic encryption so that full mathematical operations are performed on ciphertext without any performance penalty.

  • Tokens contain embedded cryptographic keys, eliminating the need for separate key management systems in the cloud.

ISC2 Certified Cloud Security Professional (CCSP)
Cloud Data Security
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot