Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 380 discussion

Actual exam question from ISC's CCSP
Question #: 380
Topic #: 1
[All CCSP Questions]

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

  • A. TLS
  • B. HTTPS
  • C. VPN
  • D. IRM
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
Information rights management (IRM) technologies allow security controls and policies to be enforced on a data object regardless of where it resides. They also allow for extended controls such as expirations and copying restrictions, which are not available through traditional control mechanisms. Hypertext Transfer
Protocol Secure (HTTPS), virtual private network (VPN), and Transport Layer Security (TLS) are all technologies and protocols that are widely used with cloud implementations for secure access to systems and services and likely will be used in conjunction with other object data protection strategies.

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Kneebee
1 month, 3 weeks ago
The answer is "D". IRM technologies normally include features such as, encryption, permissions management and usage restriction.
upvoted 2 times
...
FranklinG
8 months, 3 weeks ago
The answer is "D" Protection through Digital Rights Management (IRM): Data Rights Management technologies as SealPath (Information Rights Management) allow the encryption of documentation by applying persistent protection to it. The documentation at rest is encrypted and is only accessible to users who have access rights to it. Remember, we are also talking about data at rest here...
upvoted 3 times
...
Pika26
1 year, 6 months ago
Selected Answer: A
A: TLS
upvoted 1 times
...
[Removed]
2 years, 10 months ago
data is Object storage is mostly accessed by APIs, I would think TLS is the correct answer. IRM is mainly used while sharing.
upvoted 1 times
NastyNutsu
2 years, 7 months ago
Nevertheless, the question describes data at rest, which rules out both TLS and HTTPS
upvoted 6 times
bradseth
1 year, 9 months ago
and VPN
upvoted 2 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...