Your security team uses encryption keys to ensure confidentiality of user data. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).
Which steps should your team take before an incident occurs? (Choose two.)
parasthakur
Highly Voted 2 years, 1 month agozellck
Highly Voted 2 years, 1 month agoAzureDP900
1 year, 12 months agoglb2
Most Recent 7 months, 2 weeks agoglb2
7 months, 1 week ago[Removed]
1 year, 3 months ago[Removed]
1 year, 3 months agoPST21
1 year, 10 months agospiritix821
1 year, 10 months agoAwesomeGCP
2 years agoGHOST1985
2 years agoparasthakur
2 years, 1 month ago[Removed]
2 years, 1 month ago