QS0017-02: Encryption Key Management Policy Flashcards

1
Q

QS0017-01: Encryption Key Management Policy

What is an example of software that could be used to generate keys for software integrations or for SSH logins?

A

PuTTy has a product called PuTTyGen that may be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

QS0017-01: Encryption Key Management Policy

Can encryption processes be used without approval by DevOps?

A

Encryption processes must not be used unless DevOps approve the procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

QS0017-01: Encryption Key Management Policy

Keys used to protect production data-at-rest should be stored in two secure locations. What are the locations?

A

AWS and LastPass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

QS0017-01: Encryption Key Management Policy

How often must the keys used for encrypting data be changed?

A

At least annually; preferably automatically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

QS0017-01: Encryption Key Management Policy

When must a Digital certificate expire?

A

After a maximum of 12 months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly