Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CCSK topic 1 question 96 discussion

Actual exam question from CSA's CCSK
Question #: 96
Topic #: 1
[All CCSK Questions]

Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?

  • A. Database encryption
  • B. Media encryption
  • C. Asymmetric encryption
  • D. Object encryption
  • E. Client/application encryption
Show Suggested Answer Hide Answer
Suggested Answer: E 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
overarch384
2 weeks ago
Selected Answer: E
11.1.4.2, pg 124. Client-side encryption: When object storage is used as the back-end for an application (including mobile applications), encrypt the data using an encryption engine embedded in the application or client.
upvoted 1 times
...
BFCrypto
5 months, 3 weeks ago
Selected Answer: E
Correct Answer is E. The application or client should encrypt the data before storing in the object. If it was implemented by the server or cloud provider then they would have to hold the key which is not recommended, so best your own application has access to the key and encrypts the object before storing. This is consistent with 11.1.4.2
upvoted 2 times
...
byfener
8 months, 2 weeks ago
Selected Answer: D
When object storage is used as the back-end for an application, the appropriate encryption method would typically involve object encryption. Object encryption involves encrypting each individual object (or file) stored within the object storage system. This ensures that data remains secure even when stored in a potentially shared or publicly accessible environment. Client/application encryption (E) might refer to encryption applied by the client or application before sending data to the storage, which could be an additional layer of security but might not be the encryption method applied within the storage system itself. So, among the options provided, the most appropriate encryption method when using object storage as the back-end for an application is D. Object encryption.
upvoted 1 times
byfener
8 months, 2 weeks ago
but accordingly 11.1.4.2 Client-side encryption: answer is E. we should stick guidance I think
upvoted 4 times
...
...
salimhajji
10 months ago
The explications of Brainiac are clear and exactly but the answer of Moota are from the docs. What s the real response for the question : the definition or the words used on the references
upvoted 1 times
...
Brainiac
11 months ago
D. Object encryption Object encryption involves encrypting individual objects or files stored in the object storage system. It ensures that each object is encrypted before being stored and can only be decrypted by authorized users or applications with the appropriate encryption keys. Object encryption provides granular control over the encryption of data at rest, making it suitable for securing data stored in object storage. It helps protect the confidentiality and integrity of the stored objects, even if the underlying storage infrastructure is compromised. The other encryption methods mentioned are not specifically tailored for object storage scenarios: A. Database encryption typically refers to encrypting data within a database management system, which is different from object storage. B. Media encryption involves encrypting storage media such as hard drives or tapes, rather than individual objects within an object storage system. E. Client/application encryption refers to encrypting data at the client or application level before it is sent to the storage system, which is independent of the specific storage backend being used.
upvoted 2 times
...
moota
1 year, 1 month ago
Selected Answer: E
11.1.4.2 Client-side encryption: When object storage is used as the back-end for an application (including mobile applications), encrypt the data using an encryption engine embedded in the application or client.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...