Watch this video on YouTube
In evaluating data security measures, you are reviewing the capabilities of data masking technologies. Which of the following is not a typical feature of data masking solutions?