PrepAway - Latest Free Exam Questions & Answers

How did the enterprise protect its data?

An enterprise decided to place some sensitive data in the public cloud and implemented security
mechanisms to protect this data.
Recently the public cloud provider’s systems had a security breach. The enterprise was not
concerned because they felt their data had been completely protected. All of the services housing
the data are protected by an IPS application and no alerts were generated by the system.
How did the enterprise protect its data?

PrepAway - Latest Free Exam Questions & Answers

A.
All data in the public cloud environment was encrypted at-rest and in-transit. The encryption
keys were under complete control of the enterprise and were not available to the public provider.
The cloud provider’s logs showed that the enterprise’s services were copied.

B.
All data in the public cloud environment was encrypted at-rest and in-transit. Copies of the
encryption keys were secured by the public cloud provider in case they were lost.
The cloud provider’s logs showed that the enterprise’s services were neither accessed nor copied.

C.
All data in the public cloud environment was encrypted in-transit only. The encryption keys were
under complete control of the enterprise and were not available to the public provider.
The cloud provider’s logs showed that the enterprise’s services were copied.

D.
All data in the public cloud environment was encrypted at-rest only. The encryption keys were
under complete control of the enterprise and were not available to the public provider.
The cloud provider’s logs showed that the enterprise’s services were copied.


Leave a Reply