{"id":296,"date":"2021-01-11T09:40:46","date_gmt":"2021-01-11T09:40:46","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question289\/"},"modified":"2021-01-11T09:40:46","modified_gmt":"2021-01-11T09:40:46","slug":"certified-cloud-security-professional-ccsp-question289","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CCSP\/certified-cloud-security-professional-ccsp-question289\/","title":{"rendered":"Certified Cloud Security Professional &#8211; CCSP &#8211; Question289"},"content":{"rendered":"<div class=\"question\">Which data state would be most likely to use digital signatures as a security protection mechanism? <br \/><strong><br \/>A.<\/strong> Data in use <br \/><strong>B.<\/strong> Data in transit <br \/><strong>C.<\/strong> Archived <br \/><strong>D.<\/strong> Data at rest<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nExplanation: During the data-in-use state, the information has already been accessed from storage and transmitted to the service, so reliance on a technology such as digital signatures is imperative to ensure security and complement the security methods used during previous states. Data in transit relies on technologies such as TLS to encrypt network transmission of packets for security. Data at rest primarily uses encryption for stored file objects. Archived data would be the same as data at rest.<\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which data state would be most likely to use digital signatures as a security protection mechanism? A. Data in use B. Data in transit C. Archived D. Data at rest Show Answer Hide Answer Correct Answer: A Explanation: Explanation: During the data-in-use state, the information has already been accessed from storage and transmitted to the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,292],"class_list":["post-296","post","type-post","status-publish","format-standard","hentry","category-certified-cloud-security-professional-ccsp","tag-certified-cloud-security-professional-ccsp","tag-question-289"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/comments?post=296"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/posts\/296\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/media?parent=296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/categories?post=296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CCSP\/wp-json\/wp\/v2\/tags?post=296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}