exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 380 discussion

Actual exam question from ISC's CCSP
Question #: 380
Topic #: 1
[All CCSP Questions]

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

  • A. TLS
  • B. HTTPS
  • C. VPN
  • D. IRM
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
Information rights management (IRM) technologies allow security controls and policies to be enforced on a data object regardless of where it resides. They also allow for extended controls such as expirations and copying restrictions, which are not available through traditional control mechanisms. Hypertext Transfer
Protocol Secure (HTTPS), virtual private network (VPN), and Transport Layer Security (TLS) are all technologies and protocols that are widely used with cloud implementations for secure access to systems and services and likely will be used in conjunction with other object data protection strategies.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
WilianCArias
2 weeks, 3 days ago
Selected Answer: D
D is correct.
upvoted 1 times
...
MaciekMT
2 months, 1 week ago
Selected Answer: D
In object storage systems, Information Rights Management (IRM) is one of the most widely used technologies for protecting stored data beyond file system encryption. IRM allows for fine-grained access control, rights enforcement, and data usage policies on stored objects. 🔹 How IRM Protects Object Storage: Controls who can access, edit, copy, or print stored objects. Ensures persistent protection even after data is accessed or shared. Commonly used in cloud-based storage (e.g., Google Drive, OneDrive, AWS S3) to enforce security policies. Why Not the Others? A. TLS (Transport Layer Security) → Protects data in transit, not at rest. B. HTTPS → A secure transport protocol for accessing data, but it does not protect stored data itself. C. VPN (Virtual Private Network) → Secures network connections but does not provide object-level security within a storage system.
upvoted 1 times
...
Kneebee
7 months ago
The answer is "D". IRM technologies normally include features such as, encryption, permissions management and usage restriction.
upvoted 2 times
...
FranklinG
1 year, 1 month ago
The answer is "D" Protection through Digital Rights Management (IRM): Data Rights Management technologies as SealPath (Information Rights Management) allow the encryption of documentation by applying persistent protection to it. The documentation at rest is encrypted and is only accessible to users who have access rights to it. Remember, we are also talking about data at rest here...
upvoted 3 times
...
Pika26
1 year, 11 months ago
Selected Answer: A
A: TLS
upvoted 1 times
...
[Removed]
3 years, 3 months ago
data is Object storage is mostly accessed by APIs, I would think TLS is the correct answer. IRM is mainly used while sharing.
upvoted 1 times
NastyNutsu
3 years ago
Nevertheless, the question describes data at rest, which rules out both TLS and HTTPS
upvoted 6 times
bradseth
2 years, 2 months ago
and VPN
upvoted 2 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago