
ccsp-2
Authored by kalki disuza
English
1st Grade
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which of these options does the encryption engine reside within the application accessing the database?
A. Transparent encryption
B. Symmetric-key encryption
C. Application-level encryption
D. Homomorphic encryption
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are the security team leader for an organization that has an infrastructure as a service (IaaS) production environment hosted by a cloud provider. You want to implement an event monitoring (security information and event management [SIEM]/security information management [SIM]/security event management [SEM]) solution in your production environment in order to acquire better data for security defenses and decisions. Which of the following is probably your most significant concern about implementing this solution in the cloud?
A. The solution should give you better analysis capability by automating a great deal of the associated tasks.
B. Dashboards produced by the tool are a flawless management benefit.
C. You will have to coordinate with the cloud provider to ensure that the tool is acceptable and functioning properly.
D. Senior management will be required to approve the acquisition and implementation of the tool.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a step in the crypto-shredding process? t
A. Encrypt data with a particular encryption engine.
B. Encrypt first resulting keys with another encryption engine.
C. Save backup of second resulting keys.
D. Destroy original second resulting keys.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following sanitization methods is feasible for use in the cloud?
A. Crypto-shredding
B. Degaussing
C. Physical destruction
D. Overwriting
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a method for enhancing data portability? t
A. Crypto-shredding
B. Using standard data formats
C. Avoiding proprietary services
D. Favorable contract terms
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When implementing cryptography in a cloud environment, where is the worst place to store the keys?
A. With the cloud provider
B. Off the cloud, with the data owner
C. With a third-party provider, in key escrow
D. Anywhere but with the cloud provider
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a security concern related to archiving data for long-term t storage?
A. Long-term storage of the related cryptographic keys
B. Format of the data
C. Media the data resides on
D. Underground depth of the storage facility
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?