Which technique secures data both in transit and at rest?

Prepare for the Certified Identity and Access Manager Exam using flashcards and multiple-choice questions. Gain insights into the exam format, practice with real-world scenarios, and ensure your success in becoming a certified professional.

Multiple Choice

Which technique secures data both in transit and at rest?

Explanation:
Data encryption is the technique that protects information by turning it into unreadable ciphertext unless you have the decryption key. This protects data in transit by encrypting it as it moves across networks (for example with TLS or IPsec), so eavesdroppers can’t read it. It also protects data at rest by encrypting stored data on disks, databases, or backups (for example with AES), so even if the media is accessed, the content remains unreadable. Key management is crucial—encryption is only effective if keys are strong, securely stored, rotated, and access to them is tightly controlled. Other options support security in different ways but don’t inherently render content unreadable. Access enforcement governs who can request access, but it doesn’t prevent data exposure if data is intercepted or exfiltrated. IAM lifecycle phases and continuous monitoring focus on identity provisioning and monitoring activities rather than keeping data confidential in all states. Therefore, encryption is the method that secures data both in transit and at rest.

Data encryption is the technique that protects information by turning it into unreadable ciphertext unless you have the decryption key. This protects data in transit by encrypting it as it moves across networks (for example with TLS or IPsec), so eavesdroppers can’t read it. It also protects data at rest by encrypting stored data on disks, databases, or backups (for example with AES), so even if the media is accessed, the content remains unreadable. Key management is crucial—encryption is only effective if keys are strong, securely stored, rotated, and access to them is tightly controlled.

Other options support security in different ways but don’t inherently render content unreadable. Access enforcement governs who can request access, but it doesn’t prevent data exposure if data is intercepted or exfiltrated. IAM lifecycle phases and continuous monitoring focus on identity provisioning and monitoring activities rather than keeping data confidential in all states. Therefore, encryption is the method that secures data both in transit and at rest.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy