List of questions
Related questions
Question 192 - DAS-C01 discussion
A company uses Amazon Redshift as its data warehouse. The Redshift cluster is not encrypted. A data analytics specialist needs to use hardware security module (HSM) managed encryption keys to encrypt the data that is stored in the Redshift cluster.
Which combination of steps will meet these requirements? (Select THREE.)
A.
Stop all write operations on the source cluster. Unload data from the source cluster.
B.
Copy the data to a new target cluster that is encrypted with AWS Key Management Service (AWS KMS).
C.
Modify the source cluster by activating AWS CloudHSM encryption. Configure Amazon Redshift to automatically migrate data to a new encrypted cluster.
D.
Modify the source cluster by activating encryption from an external HSM. Configure Amazon Redshift to automatically migrate data to a new encrypted cluster.
E.
Copy the data to a new target cluster that is encrypted with an HSM from AWS CloudHSM.
F.
Rename the source cluster and the target cluster after the migration so that the target cluster is using the original endpoint.
Your answer:
0 comments
Sorted by
Leave a comment first