Enhancing Security for Cloud Data Access | SY0-601 Exam Prep

Two Methods to Enhance Cloud Data Access Security

Prev Question Next Question

Question

Which of the following would enhance the security of accessing data stored in the cloud? (Select TWO)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

BD.

Accessing data stored in the cloud presents a number of security challenges, such as unauthorized access, data breaches, and data theft. To enhance the security of accessing data stored in the cloud, the following security measures should be implemented:

A. Block level encryption: This is a data protection method that encrypts individual blocks of data, rather than encrypting the entire file or disk. Block level encryption is an effective way to protect data in the cloud because it encrypts only the data that is being accessed or modified, making it difficult for attackers to access sensitive data even if they manage to gain unauthorized access to the cloud infrastructure.

B. SAML authentication: Security Assertion Markup Language (SAML) is an XML-based open standard for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider. SAML authentication is commonly used to authenticate cloud users, allowing them to access cloud resources securely without having to enter their login credentials every time they access a new application or service.

C. Transport encryption: This is the process of encrypting data as it is transmitted across a network. Transport encryption is essential for securing data in transit between the cloud and end-users or between cloud services, making it difficult for attackers to intercept and steal sensitive data.

D. Multifactor authentication: This is a security mechanism that requires users to provide more than one form of authentication to access cloud resources. Multifactor authentication can be implemented using various authentication factors such as passwords, biometrics, smart cards, or tokens. This makes it difficult for attackers to access cloud resources even if they manage to steal a user's login credentials.

E. Predefined challenge questions: This is a security mechanism that requires users to answer predefined challenge questions to authenticate their identity. Predefined challenge questions are commonly used as an additional authentication factor in multifactor authentication, but they can also be used as a standalone authentication mechanism.

F. Hashing: This is the process of converting data into a fixed-length string of characters, called a hash, that represents the original data. Hashing is commonly used to ensure data integrity and to protect data confidentiality. In the context of cloud security, hashing can be used to protect sensitive data by encrypting it with a one-way hash function, making it difficult for attackers to access the original data.

In conclusion, the two security measures that would enhance the security of accessing data stored in the cloud are block level encryption and SAML authentication.