Exam CCSK All QuestionsBrowse all questions from this exam
Question 150

What are the three valid options for protecting data as it moves to and within the cloud?

    Correct Answer: A

    The three valid options for protecting data as it moves to and within the cloud are Client/Application Encryption, Link/Network Encryption, and Proxy-Based Encryption. Client/Application Encryption involves encrypting data at the client or application level before it is transmitted, ensuring data remains encrypted during its journey. Link/Network Encryption secures data as it travels over networks, preventing unauthorized interception and access by using protocols like TLS/SSL. Proxy-Based Encryption adds an extra layer of security by using a proxy to encrypt and decrypt data as it moves in and out of the cloud environment.

Discussion
PetzaOption: A

11.1.3.1. There are a few options for in-transit encryption depending on what the cloud platform supports. One way is to encrypt before sending to the cloud (client-side encryption). Network encryption (TLS/SFTP/etc.) is another option. Most cloud provider APIs use Transport Layer Security (TLS) by default; if not, pick a different provider, since this is an essential security capability. Proxy-based encryption may be a third option, where you place an encryption proxy in a trusted area between the cloud user and the cloud provider and the proxy manages the encryption before transferring the data to the provider.

tralala2Option: A

A is correct

byfenerOption: A

A. Client/Application Encryption, Link/Network Encryption, Proxy-Based Encryption The three valid options for protecting data as it moves to and within the cloud are: Client/Application Encryption: Encrypting the data at the client or application level before it is transmitted to the cloud. This ensures that the data remains encrypted during its entire journey to the cloud. Link/Network Encryption: Encrypting the data as it travels over networks, including the Internet, to prevent unauthorized interception and access. This involves using secure communication protocols such as TLS/SSL. Proxy-Based Encryption: Using a proxy or intermediary to encrypt and decrypt data as it enters and leaves the cloud environment. This can provide an additional layer of security and control over data flows.

NJALPHAOption: A

A is the right answer