Ultimate access to all questions.
Upgrade Now 🚀
Sign in to unlock AI tutor
Your organization uses Cloud KMS symmetric encryption keys to protect user data. To minimize the impact of a potential key compromise, which two actions should you proactively take?
A
Disable and revoke access to compromised keys.
B
Enable automatic key version rotation on a regular schedule.
C
Manually rotate key versions on an ad hoc schedule.
D
Limit the number of messages encrypted with each key version.
E
Disable the Cloud KMS API.