ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 46 - SCS-C02 discussion

Report
Export

An organization has a multi-petabyte workload that it is moving to Amazon S3, but the CISO is concerned about cryptographic wear-out and the blast radius if a key is compromised. How can the CISO be assured that IAM KMS and Amazon S3 are addressing the concerns? (Select TWO )

A.
There is no API operation to retrieve an S3 object in its encrypted form.
Answers
A.
There is no API operation to retrieve an S3 object in its encrypted form.
B.
Encryption of S3 objects is performed within the secure boundary of the KMS service.
Answers
B.
Encryption of S3 objects is performed within the secure boundary of the KMS service.
C.
S3 uses KMS to generate a unique data key for each individual object.
Answers
C.
S3 uses KMS to generate a unique data key for each individual object.
D.
Using a single master key to encrypt all data includes having a single place to perform audits and usage validation.
Answers
D.
Using a single master key to encrypt all data includes having a single place to perform audits and usage validation.
E.
The KMS encryption envelope digitally signs the master key during encryption to prevent cryptographic wear-out
Answers
E.
The KMS encryption envelope digitally signs the master key during encryption to prevent cryptographic wear-out
Suggested answer: C, E

Explanation:

because these are the features that can address the CISO's concerns about cryptographic wear-out and blast radius. Cryptographic wear-out is a phenomenon that occurs when a key is used too frequently or for too long, which increases the risk of compromise or degradation. Blast radius is a measure of how much damage a compromised key can cause to the encrypted data. S3 uses KMS to generate a unique data key for each individual object, which reduces both cryptographic wear-out and blast radius. The KMS encryption envelope digitally signs the master key during encryption, which prevents cryptographic wear-out by ensuring that only authorized parties can use the master key. The other options are either incorrect or irrelevant for addressing the CISO's concerns.

asked 16/09/2024
Areeluck Parnsoonthorn
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first