An existing application stores sensitive information on a non-boot Amazon EBS data volume attached to an Amazon Elastic Compute Cloud instance. Which of the following approaches would protect the sensitive data on an Amazon EBS volume?

A. Upload your customer keys to AWS CloudHSM. Associate the Amazon EBS volume with AWS CloudHSM. Re-mount the Amazon EBS volume.
B. Create and mount a new, encrypted Amazon EBS volume. Move the data to the new volume. Delete the oldAmazon EBS volume.
C. Unmount the EBS volume. Toggle the encryption attribute to True. Re-mount the Amazon EBS volume.
D. Snapshot the current Amazon EBS volume. Restore the snapshot to a new, encrypted Amazon EBS volume. Mount the Amazon EBS volume


Answer: B. Create and mount a new, encrypted Amazon EBS volume. Move the data to the new volume. Delete the oldAmazon EBS volume.

Computer Science & Information Technology

You might also like to view...

All methods specified by an interface are __________.

a. private b. public c. protected d. static

Computer Science & Information Technology

Fill in the code to complete the following method for computing factorial.

``` /** Return the factorial for a specified index */ public static long factorial(int n) { if (n == 0) // Base case return 1; else return _____________; // Recursive call } ``` a. n * (n - 1) b. n c. n * factorial(n - 1) d. factorial(n - 1) * n

Computer Science & Information Technology

It is easier to create the form controls first and then add the group boxes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Someone who uses the Internet to harass, threaten, or intimidate another person is guilty of identity theft

Indicate whether the statement is true or false.

Computer Science & Information Technology