Refresh the Page to Try Again!!!
Results
Good Job!!
You’re not ready,
Back to the Books
#1. This classification approach inspects and interprets data looking for known sensitive data.
#2. Cloud services offered by a provider to a limited and well-defined number of parties. is defined as which.
#3. You need to perform a bulk security tests on the images in your network, which would be the best approach?
#4. Audits generally include some two forms of testing. Which include the following. (pick two)
Select all that apply:
#5. A workload is a unit of processing. It can be executed on a physical server, on a virtual server, or in a container. True or False
#6. When object storage is used as the back-end for an application (including mobile applications), encrypt the data using an encryption engine embedded in the application or client is known as.
#7. Which of the following is not a tool for Cloud Governance?
#8. Managing data location/residency, Ensuring compliance and Backups and business continuity are part of which security method?
#9. Mapping an identity (including roles, personas, and attributes) to an authorization.
#10. Vulnerability assessments (VAs) should always be performed on images before they are used to launch instance. True or False
#11. Creating a bastion network and forcing all cloud traffic through it can act as a chokepoint. True or False
#12. Data is encrypted in the PaaS application or the client accessing the platform is known as.
#13. Allows for a logical grouping of ports or nodes that restricts certain hosts to accessing only specified storage devices
#14. This classification approach looks at application, storage location, or the creator of the data as an indicator of sensitive information.
#15. When it comes to Application security how would you prevent information disclosure?
#16. Private cloud governance depends on who owns and operates the private cloud: If you outsource a private cloud, governance changes. True or False
#17. Both China and Russia require that user data be localized. True or False
#18. A point-in-time look at the design of the controls is known as?
#19. In which cloud service models is the customer responsible for the client access endpoints.
#20. Substantive testing is used to determine whether controls have been properly designed and implemented. True or False
#21. Which of the following is incorrect as it pertains to SaaS cloud service responsibilities.
#22. Full DRM and Provider-based control are both aspects of.
#23. For cloud overlay networks, in order to span multiple physical networks across a wide area network you can implement which of the following.
#24. In which phase of the Data Lifecycle does Classifications and Entitlements occur?
#25. An architectural concept that enables centralized management and emphasizes the role of software in running networks to dynamically control, change, and manage network behavior.
#26. With immutable servers, you can increase security by patching and testing images and replacing non-patched instances built off the newly patched image. True of False with new
#27. A bastion network can be defined as a network that data must go through in order to get to a destination, True or False
#28. When it comes to Application security how would you prevent Spoofing
#29. Difference between REST API’s and SOAP API’s are?
Select all that apply: