O'Reilly logo

AWS: Security Best Practices on AWS by Albert Anthony

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Assessments

  1. Which among the following is used for creating and controlling keys used for data encryption in AWS?
    1. IAM
    2. HSM
    3. KMS
    4. S3
  2. Asymmetric encryption is also known as _______.
    1. Private key encryption
    2. Public key encryption
    3. Secret key encryption
    4. Data key encryption
  3. For encrypting data in AWS, which among the following is used to convert plaintext data into cipher text using the encryption algorithm?
    1. Cipher text private key
    2. Cipher text public key
    3. Plaintext private key
    4. Plaintext data key
  4. For decrypting data in AWS, cipher text uses the _____ for converting cipher text into plaintext by applying the decryption algorithm.
    1. Plaintext public key
    2. Plaintext data key
    3. Plaintext private key
    4. Plaintext secret key
  5. State whether the following statement is True or False: AWS uses envelope ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required