Valid 1Z0-574 Dumps shared by ExamDiscuss.com for Helping Passing 1Z0-574 Exam! ExamDiscuss.com now offer the newest 1Z0-574 exam dumps, the ExamDiscuss.com 1Z0-574 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com 1Z0-574 dumps with Test Engine here:
Which of the following statements are true about an end-to-end security strategy?
Correct Answer: B,C,E
Explanation/Reference: B: End to end security is an information-centric perspective of security where information is protected throughout the entire computing environment. That is, from the points where system interactions originate, through all points of integration, processing, and persistence. End to end security is often associated with the secure transmission, processing, and storage of data, where at no time are data unprotected Note: For a typical web-based application, end to end security generally begins at the client/browser, and ends at the application database and all external dependencies of the application. A common challenge in providing end to end security is finding a suitable way to secure data in all states and points along the processing path that does not interfere with any transmission, routing, processing, and storage functions that need to occur along the way. Sensitive data will usually need to be decrypted at certain points in order for processing or message routing to occur. Incorrect answers: A: A lesser alternative to end to end security is point to point security. This is used to protect messages in transit. It assumes that other means of security are used to protect messages during processing and persistence. Point to point security is often used as a default or minimal security option in order to protect messages over insecure networks. Generally, less effort is made to protect data behind the corporate firewall. This opens up a number of vulnerabilities and risks to an organization. D: Cryptography conflicts is not an issue, though it would be unnecessary to encrypt the same data twice.