Your security team uses encryption keys to ensure confidentiality of user data. You want to establish a process to reduce the impact of a potentially compromised symmetric encryption key in Cloud Key Management Service (Cloud KMS).
Which steps should your team take before an incident occurs? (Choose two.)
parasthakur
Highly Voted 2 years, 3 months agozellck
Highly Voted 2 years, 2 months agoAzureDP900
2 years, 1 month agoglb2
Most Recent 9 months agoglb2
8 months, 3 weeks ago[Removed]
1 year, 4 months ago[Removed]
1 year, 4 months agoPST21
1 year, 12 months agospiritix821
2 years agoAwesomeGCP
2 years, 2 months agoGHOST1985
2 years, 2 months agoparasthakur
2 years, 3 months ago[Removed]
2 years, 3 months ago