LeetQuiz Logo
Privacy Policy•contact@leetquiz.com
© 2025 LeetQuiz All rights reserved.
Google Professional Cloud DevOps Engineer

Google Professional Cloud DevOps Engineer

Get started today

Ultimate access to all questions.


To safeguard sensitive information in an application deployment, minimizing exposure risks during a breach is crucial. Which strategies effectively enhance data security?

Real Exam



Explanation:

Storing encryption keys in Cloud Key Management Service (KMS) and rotating them periodically is the most secure approach. KMS offers a robust platform for key management, featuring audit logs, automatic key deletion, and key rotation. These measures significantly reduce the risk and impact of potential breaches by limiting unauthorized access duration.

Powered ByGPT-5