Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CCSP topic 1 question 289 discussion

Actual exam question from ISC's CCSP
Question #: 289
Topic #: 1
[All CCSP Questions]

Which data state would be most likely to use digital signatures as a security protection mechanism?

  • A. Data in use
  • B. Data in transit
  • C. Archived
  • D. Data at rest
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️
During the data-in-use state, the information has already been accessed from storage and transmitted to the service, so reliance on a technology such as digital signatures is imperative to ensure security and complement the security methods used during previous states. Data in transit relies on technologies such as TLS to encrypt network transmission of packets for security. Data at rest primarily uses encryption for stored file objects. Archived data would be the same as data at rest.

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
stack120566
1 month, 3 weeks ago
Thew question asks Which data state would be most likely to use digital signatures as a security protection mechanism? The term 'use as security protection" Digital signatures are deployed against transmitted data, These signatures provide for an integrity check value when the signature is verified which is when the data is used or accessed. The digital signature does not really protect anything but rather alert the recipient to tampering. Signatures can are applied with or without encryption. The checking of the signature is not performed during transit. The signature is checked by the recipient when the data is checked. The digital signature is used when data is used.
upvoted 1 times
...
nelombg
10 months, 3 weeks ago
B. Data in transit
upvoted 2 times
...
Pika26
11 months, 1 week ago
Selected Answer: B
B: Data in transit
upvoted 1 times
...
ikamalbhatt
11 months, 2 weeks ago
Selected Answer: A
Digital signatures are most likely to be used as a security protection mechanism for data that is in a "transmitted" state. This is because digital signatures provide a way to ensure the integrity and authenticity of data during transmission, which is particularly important when data is being sent over an insecure network such as the internet. Digital signatures work by using cryptography to create a unique "signature" of the data that can be verified by the recipient to ensure that the data has not been tampered with or altered during transmission. This helps to prevent unauthorized access, interception, or modification of the data while it is in transit. In contrast, digital signatures may not be as necessary for data that is in a "stored" state, such as data that is saved on a secure server or database. In this case, other security mechanisms such as access controls, encryption, and backups may be more important for protecting the data.
upvoted 3 times
...
DaddyPan
1 year, 8 months ago
TLS also used digital certificates. TLS is used to protect data in use
upvoted 2 times
...
akg001
1 year, 11 months ago
Selected Answer: A
A. Data in use
upvoted 2 times
...
[Removed]
2 years, 3 months ago
Answer B. Data in use controls, IRM/DRM, access control. while data is being used its decrypted. TLS, VPN, SSH are controls in Data in transit phase. part of TLS is to also Authenticate parties using digital cert before secure channel can establish. refer CBK 3rd edition page 45.
upvoted 2 times
...
AWSPro24
2 years, 3 months ago
However, pg 178 of the CBK "Data in use: This requires access control with granularity that is relevant for the data at risk. APIs should be protected through the use of digital signatures and encryption where necessary, and access rights should be restricted to the roles of the consumer."
upvoted 2 times
...
AWSPro24
2 years, 3 months ago
Digital Signatures are used as the foundational technologies for certificates which are the core technology underpinning TLS.
upvoted 3 times
...
babusartop17
2 years, 10 months ago
data in transit is the correct answer
upvoted 4 times
xaccan
2 years, 7 months ago
you are wrong, it is data in use, please do your homework.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...