Which of the following should be deployed to secure the personal information?

A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest.

Which of the following should be deployed to secure the personal information?
A . Implement data tokenization.
B . Implement hardware-based encryption.
C . Implement centralized key management.
D . Implement database-embedded encryption.

Answer: C

Explanation:

Reference: https://info.townsendsecurity.com/definitive-guide-to-encryption-key-management-fundamentals

Latest CV0-002 Dumps Valid Version with 328 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments