The answer is A.
https://cyberark-customers.force.com/s/article/What-risks-and-considerations-should-be-made-for-Vault-key-management
What does the organization consider a compromise of encryption keys?
· Unknown chain of custody
· Keys copied to filesystems outside of the vault including network shares
· Copies being made without knowledge
This section is not available anymore. Please use the main Exam Page.PAM-DEF Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
TacoTeo
Highly Voted 1 year, 6 months ago2995142
Most Recent 5 months, 3 weeks agoPrasant_Shanmugasekar
10 months, 1 week agoExamsAE
1 year, 4 months ago