Topic 1 Question 297
A company hosts a web-based application that captures and stores sensitive data in an Amazon DynamoDB table. The company needs to implement a solution that provides end-to-end data protection and the ability to detect unauthorized data changes.
Which solution will meet these requirements?
Use an AWS Key Management Service (AWS KMS) customer managed key. Encrypt the data at rest.
Use AWS Private Certificate Authority. Encrypt the data in transit.
Use the DynamoDB Encryption Client. Use client-side encryption. Sign the table items.
Use the AWS Encryption SDK. Use client-side encryption. Sign the table items.
ユーザの投票
コメント(1)
- 正解だと思う選択肢: C
End-to-end protection: Encrypts data before sending it to DynamoDB and provides a way to verify the data integrity through signing. Comprehensive solution: Meets both requirements of encrypting data and detecting unauthorized changes (through data signing).
👍 1AWSLoverLoverLoverLoverLover2025/02/20
シャッフルモード