Assessments

  1. Which among the following is used for creating and controlling keys used for data encryption in AWS?
    1. IAM
    2. HSM
    3. KMS
    4. S3
  2. Asymmetric encryption is also known as _______.
    1. Private key encryption
    2. Public key encryption
    3. Secret key encryption
    4. Data key encryption
  3. For encrypting data in AWS, which among the following is used to convert plaintext data into cipher text using the encryption algorithm?
    1. Cipher text private key
    2. Cipher text public key
    3. Plaintext private key
    4. Plaintext data key
  4. For decrypting data in AWS, cipher text uses the _____ for converting cipher text into plaintext by applying the decryption algorithm.
    1. Plaintext public key
    2. Plaintext data key
    3. Plaintext private key
    4. Plaintext secret key
  5. State whether the following statement is True or False: AWS uses envelope encryption to encrypt data directly.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.82.21