To best prevent a data breach from happening, cryptographic keys should be:
C. rotated regularly.
Regularly rotating cryptographic keys helps ensure that even if a key is compromised, the impact is minimized because the new keys will replace the old ones, limiting the period during which the compromised key could be exploited. This practice enhances security by reducing the risk of long-term exposure of sensitive data.
D. Page 80 of the CCAK Study Guide
Like any other contracts for services, CSP agreements allocate responsibilities between the CSP and the customer......These responsibilities and risks concern only the relationship between the CSP and the cloud customer. Unless specifically and clearly stated in the contract terms, the CSP does not agree to be responsible to the cloud customer's own customers. The CSP is responsible only for providing the service that it committed to provide and it is only responsible to the cloud customer.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.CCAK Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Auditor2020
1 month, 1 week ago339dfab
6 months, 3 weeks ago