{"id":259,"date":"2021-01-11T09:40:07","date_gmt":"2021-01-11T09:40:07","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question252\/"},"modified":"2021-01-11T09:40:07","modified_gmt":"2021-01-11T09:40:07","slug":"certified-cloud-security-professional-ccsp-question252","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question252\/","title":{"rendered":"Certified Cloud Security Professional &#8211; CCSP &#8211; Question252"},"content":{"rendered":"<div class=\"question\">In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model? <br \/><strong><br \/>A.<\/strong> Demagnetizing <br \/><strong>B.<\/strong> Shredding <br \/><strong>C.<\/strong> Degaussing <br \/><strong>D.<\/strong> Cryptographic erasure<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>D<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nExplanation: Cryptographic erasure is a secure method to destroy data by destroying the keys that were used to encrypt it. This method is universally available for volume storage on IaaS and is also extremely quick. Shredding, degaussing, and demagnetizing are all physically destructive methods that would not be permitted within a cloud environment using shared resources.<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model? A. Demagnetizing B. Shredding C. Degaussing D. Cryptographic erasure Show Answer Hide Answer Correct Answer: D Explanation: Explanation: Cryptographic erasure is a secure method to destroy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,255],"class_list":["post-259","post","type-post","status-publish","format-standard","hentry","category-certified-cloud-security-professional-ccsp","tag-certified-cloud-security-professional-ccsp","tag-question-252"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/259\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/media?parent=259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/categories?post=259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/tags?post=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}