It encrypts and isolates in-use data and the applications processing that data, thereby preventing unauthorized access or modification is an accurate description of the key features and benefits of OCI Confidential Computing. Confidential Computing is a feature that leverages hardware-based Trusted Execution Environments (TEEs) to protect data and applications from unauthorized access or modification while they are in use by the CPU or memory. This adds an extra layer of security to cloud computing, as it protects data not only at rest and in transit, but also in use. The other options are not accurate descriptions of the key features and benefits of OCI Confidential Computing. Reference: [Confidential Computing]
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
GiorgioGss
7 months, 2 weeks agodaws08322
12 months ago