Search Header Logo

ccsp-2

Authored by kalki disuza

English

1st Grade

Used 8+ times

ccsp-2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which of these options does the encryption engine reside within the application accessing the database?

A. Transparent encryption

B. Symmetric-key encryption

C. Application-level encryption

D. Homomorphic encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are the security team leader for an organization that has an infrastructure as a service (IaaS) production environment hosted by a cloud provider. You want to implement an event monitoring (security information and event management [SIEM]/security information management [SIM]/security event management [SEM]) solution in your production environment in order to acquire better data for security defenses and decisions. Which of the following is probably your most significant concern about implementing this solution in the cloud?

A. The solution should give you better analysis capability by automating a great deal of the associated tasks.

B. Dashboards produced by the tool are a flawless management benefit.

C. You will have to coordinate with the cloud provider to ensure that the tool is acceptable and functioning properly.

D. Senior management will be required to approve the acquisition and implementation of the tool.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a step in the crypto-shredding process? t

A. Encrypt data with a particular encryption engine.

B. Encrypt first resulting keys with another encryption engine.

C. Save backup of second resulting keys.

D. Destroy original second resulting keys.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following sanitization methods is feasible for use in the cloud?

A. Crypto-shredding

B. Degaussing

C. Physical destruction

D. Overwriting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a method for enhancing data portability? t

A. Crypto-shredding

B. Using standard data formats

C. Avoiding proprietary services

D. Favorable contract terms

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When implementing cryptography in a cloud environment, where is the worst place to store the keys?

A. With the cloud provider

B. Off the cloud, with the data owner

C. With a third-party provider, in key escrow

D. Anywhere but with the cloud provider

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a security concern related to archiving data for long-term t storage?

A. Long-term storage of the related cryptographic keys

B. Format of the data

C. Media the data resides on

D. Underground depth of the storage facility

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?