Refresh the Page to Try Again!!!

 
QUIZ START

Results

Good Job!!

You’re not ready,

Back to the Books

#1. You have a access security concern that is not covered in the contract and no way to enforce it, this is know as a.

#2. Which of the following is not a benefit of SDN Security.

#3. In order to create a logical drive on 100TB hard-drive and have it be identified as a separate drive what would you use?

#4. With securing data in the cloud Access controls and encryption are the core data security controls in use. True or False

#5. This classification approach looks at application, storage location, or the creator of the data as an indicator of sensitive information.

#6. With securing cloud data transfers, most cloud provider APIs use Transport Layer Security (TLS) by default. True or False

#7. Substantive testing is used to determine whether controls have been properly designed and implemented. True or False

#8. What does AICPA’s five Trust Services Criteria consist of?

#9. Many cloud breaches attack those who maintain the cloud, not just the application running in the cloud. True or False

#10. Compliance testing is used to determine whether controls have been properly designed and implemented. And to determine whether the controls are operating properly. True or False

#11. In which cloud service models is the customer responsible for the client access endpoints.

#12. Volatile memory contains all kinds of potentially sensitive information, who responsible for ensuring strong isolation of volatile memory in the cloud.

#13. Full DRM and Provider-based control are both aspects of.

#14. Cloud services offered by a provider to a limited and well-defined number of parties. is defined as which.

#15. Which of the following is not one of the five Trust Services Criteria that a CSP will attest to.

#16. Includes managing overall risk for the organization, aligned with the organization’s governance and risk tolerance.

#17. When it comes to Application security how would you prevent Elevation of Privilege.

#18. In a Immutable environment, It is best practice, to get logs off servers and on to a centralized location as quickly as possible, because all servers must be considered ephemeral in the cloud. True or False

#19. Access controls in the cloud should be implemented in all of the layers except.

#20. Data passes through an encryption proxy before being sent to the SaaS application is known as?

#21. This publicly available high-level SOC report contains a statement from an independent CPA that a SOC engagement was performed.

#22. Container systems usually consist of the following except.

#23. Responsible for overseeing business and billing administration, purchasing cloud services, and requesting audit reports when necessary.as well as processing financial transactions

#24. A workload is a unit of processing. It can be executed on a physical server, on a virtual server, or in a container. True or False

#25. Includes the policy, process, and internal controls that direct how an organization is run, relies on the compliance function to ensure that directives are being followed.

#26. Difference between REST API’s and SOAP API’s are?

Select all that apply:

#27. Providers will usually encrypt all customer data at which level.

#28. Of the cloud service models who is responsible for physical security on premises.

#29. Relevant industry best practices, global standards, and regulations can be used to assist in building a cloud governance framework. True or False.

#30. The CCM and EU GDPR are best practices and/or standards that can be leveraged to create a cloud governance framework. True or False?

#31. When it comes to Application security how would you prevent data modification.

#32. Application Security: CI/CD pipelines can actually enhance security through supporting immutable infrastructures, automating security testing, and providing extensive logging of application. True or False

#33. Combines both device and user authentication to provision network access to resources dynamically.

#34. With immutable servers, you can increase security by patching and testing images and replacing non-patched instances built off the newly patched image. True of False with new

#35. Substantive testing, looks at the accuracy and integrity of transactions that go through processes and information systems. True or False

Previous
Finish