Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CCSK topic 1 question 155 discussion

Actual exam question from CSA's CCSK
Question #: 155
Topic #: 1
[All CCSK Questions]

What are the three valid options for protecting data as it moves to and within the cloud?

  • A. Client/Application Encryption, Link/Network Encryption, Proxy-Based Encryption
  • B. Client/Application Encryption, Link/Network Encryption, Hypervisor Encryption
  • C. Client/Application Bundling, Link/Network Bundling, Proxy-Based Bundling
  • D. Password Encryption, Link/Network Encryption, Proxy-Based Encryption
  • E. Client/Application Encryption, Cloud Encoding, Proxy-Based Encryption
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Petza
Highly Voted 1 year, 5 months ago
Selected Answer: A
11.1.3.1. There are a few options for in-transit encryption depending on what the cloud platform supports. One way is to encrypt before sending to the cloud (client-side encryption). Network encryption (TLS/SFTP/etc.) is another option. Most cloud provider APIs use Transport Layer Security (TLS) by default; if not, pick a different provider, since this is an essential security capability. Proxy-based encryption may be a third option, where you place an encryption proxy in a trusted area between the cloud user and the cloud provider and the proxy manages the encryption before transferring the data to the provider.
upvoted 8 times
...
byfener
Most Recent 8 months, 2 weeks ago
Selected Answer: A
A. Client/Application Encryption, Link/Network Encryption, Proxy-Based Encryption The three valid options for protecting data as it moves to and within the cloud are: Client/Application Encryption: Encrypting the data at the client or application level before it is transmitted to the cloud. This ensures that the data remains encrypted during its entire journey to the cloud. Link/Network Encryption: Encrypting the data as it travels over networks, including the Internet, to prevent unauthorized interception and access. This involves using secure communication protocols such as TLS/SSL. Proxy-Based Encryption: Using a proxy or intermediary to encrypt and decrypt data as it enters and leaves the cloud environment. This can provide an additional layer of security and control over data flows.
upvoted 1 times
...
NJALPHA
1 year, 1 month ago
A is the right answer
upvoted 1 times
...
tralala2
1 year, 5 months ago
Selected Answer: A
A is correct
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...