When deploying a new environment with sensitive information traveling across external links, which measure helps prevent unauthorized access to this data?
Delete session logs once the environment is deployed
Enable multi-step identity checks for administrators
Turning on cryptographic connections to endpoints hides data from unauthorized parties while it travels outside the environment. Multi-step identity checks help regulate who can access the system but do not secure the information that moves across external links. Restricting ephemeral certificates in this way does not enhance protection of data in transit. Deleting session logs after deployment does not address eavesdropping concerns for in-transit data.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a cryptographic connection, and how does it secure data in transit?
Open an interactive chat with Bash
Why are multi-step identity checks insufficient to protect data in transit?
Open an interactive chat with Bash
What are ephemeral certificates, and why don’t they enhance in-transit security?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Deployment
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access