Question 276

Which of the following technologies allows for the secure exchange of encryption keys within an internal network?
  • Question 277

    An administrator is tasked with encrypting all Personally Identifiable Information (PII) within a cloud- based database. Which of the following types of encryption will ensure that ONLY this type of information is encrypted while the rest of the database remains unencrypted?
  • Question 278

    A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest.
    Which of the following should be deployed to secure the personal information?
  • Question 279

    A company is experiencing latency problems connecting to the cloud. Which of the following should an administrator check FIRST?
  • Question 280

    When the cache receives write data from the hosts, which of the following does the controller send back to the host?