From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Cryptographic applications Q&A
From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Cryptographic applications Q&A
- [Instructor] You are reviewing the security groups for a set of servers that you have hosted in the cloud and you find that they are using a number of common protocols. Which one of the following protocols would cause you the most concern? Would you be worried if your servers support HTTPS, SSH, FTP, or SCP? Let me repeat the question for you. You are reviewing the security groups for a set of servers that you have hosted in the cloud and you find that they are using a number of common protocols. Which one of the following protocols would cause you the most concern? Would you be worried if your servers support HTTPS, SSH, FTP, or SCP? (whooshing) (ticking) (ringing) Finding FTP on a server is a big red flag because FTP is an insecure protocol that runs in clear text. SCP, FTPS, or SFTP would be far better choices. HTTPS, SSH, and SCP are all secure protocols and their use should not cause you concern. Are you…
Contents
-
-
-
Cloud data storage1m 43s
-
Cloud data storage Q&A1m 27s
-
Encryption2m 7s
-
Encryption Q&A1m 33s
-
Key management1m 54s
-
Key management Q&A1m 46s
-
Public key infrastructure2m 28s
-
Public key infrastructure Q&A1m 32s
-
Cryptographic applications1m 53s
-
Cryptographic applications Q&A1m 20s
-
Data protection1m 52s
-
Data protection Q&A1m 14s
-
Information management2m 52s
-
Information management Q&A1m 4s
-
Data event auditability2m 59s
-
Data event auditability Q&A1m 1s
-
-