EMERGING TRENDS IN SOFTWARE ENGINEERING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
WHICH OF THE FOLLOWING IS NOT A PHASE OF KEY MANAGEMENT
|
CREATION
|
|
VERIFICATION
|
|
MONITORING
|
|
DESTRUCTION
|
Explanation:
Detailed explanation-1: -Azure key management services. Azure offers several options for storing and managing your keys in the cloud, including Azure Key Vault, Azure Managed HSM, Dedicated HSM, and Payments HSM.
Detailed explanation-2: -Symmetric. The symmetric encryption method uses a single key both to encrypt and decrypt the data. Asymmetric. The second major encryption method is asymmetric encryption, also sometimes known as public key encryption. Hashing.
Detailed explanation-3: -Awareness of current standards. Prevent individual total access. Plan for the future. Centralize control. Comprehensive logging. Integrate and unify. Consolidate systems. 06-Oct-2017
There is 1 question to complete.