Your security team uses encryption keys to ensure confidentiality of user data. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).
Which steps should your team take before an incident occurs? (Choose two.)
parasthakur
Highly Voted 2 years, 4 months agozellck
Highly Voted 2 years, 4 months agoAzureDP900
2 years, 3 months agoglb2
Most Recent 10 months, 3 weeks agoglb2
10 months, 2 weeks agoPST21
2 years, 1 month agospiritix821
2 years, 1 month agoAwesomeGCP
2 years, 4 months agoGHOST1985
2 years, 4 months agoparasthakur
2 years, 4 months ago