Refresh the Page to Try Again!!!

 
QUIZ START

Results

Good Job!!

You’re not ready,

Back to the Books

#1. This classification approach inspects and interprets data looking for known sensitive data.

#2. Cloud services offered by a provider to a limited and well-defined number of parties. is defined as which.

#3. You need to perform a bulk security tests on the images in your network, which would be the best approach?

#4. Audits generally include some two forms of testing. Which include the following. (pick two)

Select all that apply:

#5. A workload is a unit of processing. It can be executed on a physical server, on a virtual server, or in a container. True or False

#6. When object storage is used as the back-end for an application (including mobile applications), encrypt the data using an encryption engine embedded in the application or client is known as.

#7. Which of the following is not a tool for Cloud Governance?

#8. Managing data location/residency, Ensuring compliance and Backups and business continuity are part of which security method?

#9. Mapping an identity (including roles, personas, and attributes) to an authorization.

#10. Vulnerability assessments (VAs) should always be performed on images before they are used to launch instance. True or False

#11. Creating a bastion network and forcing all cloud traffic through it can act as a chokepoint. True or False

#12. Data is encrypted in the PaaS application or the client accessing the platform is known as.

#13. Allows for a logical grouping of ports or nodes that restricts certain hosts to accessing only specified storage devices

#14. This classification approach looks at application, storage location, or the creator of the data as an indicator of sensitive information.

#15. When it comes to Application security how would you prevent information disclosure?

#16. Private cloud governance depends on who owns and operates the private cloud: If you outsource a private cloud, governance changes. True or False

#17. Both China and Russia require that user data be localized. True or False

#18. A point-in-time look at the design of the controls is known as?

#19. In which cloud service models is the customer responsible for the client access endpoints.

#20. Substantive testing is used to determine whether controls have been properly designed and implemented. True or False

#21. Which of the following is incorrect as it pertains to SaaS cloud service responsibilities.

#22. Full DRM and Provider-based control are both aspects of.

#23. For cloud overlay networks, in order to span multiple physical networks across a wide area network you can implement which of the following.

#24. In which phase of the Data Lifecycle does Classifications and Entitlements occur?

#25. An architectural concept that enables centralized management and emphasizes the role of software in running networks to dynamically control, change, and manage network behavior.

#26. With immutable servers, you can increase security by patching and testing images and replacing non-patched instances built off the newly patched image. True of False with new

#27. A bastion network can be defined as a network that data must go through in order to get to a destination, True or False

#28. When it comes to Application security how would you prevent Spoofing

#29. Difference between REST API’s and SOAP API’s are?

Select all that apply:

#30. The ability for system components to work together to deliver a service is called.

#31. This publicly available high-level SOC report contains a statement from an independent CPA that a SOC engagement was performed.

#32. In which phase of the Data Lifecycle does encryption at rest occur?

#33. Which of the following is not one of the four NIST/ISO/IEC deployment models.

#34. The CCM and EU GDPR are best practices and/or standards that can be leveraged to create a cloud governance framework. True or False?

#35. Fuzz Testing: Trying to generate an error code while the application is running is an example of?

Previous
Finish