Refresh the Page to Try Again!!!
Results
Good Job!!
You’re not ready,
Back to the Books
#1. You have a access security concern that is not covered in the contract and no way to enforce it, this is know as a.
#2. Which of the following is not a benefit of SDN Security.
#3. In order to create a logical drive on 100TB hard-drive and have it be identified as a separate drive what would you use?
#4. With securing data in the cloud Access controls and encryption are the core data security controls in use. True or False
#5. This classification approach looks at application, storage location, or the creator of the data as an indicator of sensitive information.
#6. With securing cloud data transfers, most cloud provider APIs use Transport Layer Security (TLS) by default. True or False
#7. Substantive testing is used to determine whether controls have been properly designed and implemented. True or False
#8. What does AICPA’s five Trust Services Criteria consist of?
#9. Many cloud breaches attack those who maintain the cloud, not just the application running in the cloud. True or False
#10. Compliance testing is used to determine whether controls have been properly designed and implemented. And to determine whether the controls are operating properly. True or False
#11. In which cloud service models is the customer responsible for the client access endpoints.
#12. Volatile memory contains all kinds of potentially sensitive information, who responsible for ensuring strong isolation of volatile memory in the cloud.
#13. Full DRM and Provider-based control are both aspects of.
#14. Cloud services offered by a provider to a limited and well-defined number of parties. is defined as which.
#15. Which of the following is not one of the five Trust Services Criteria that a CSP will attest to.
#16. Includes managing overall risk for the organization, aligned with the organization’s governance and risk tolerance.
#17. When it comes to Application security how would you prevent Elevation of Privilege.
#18. In a Immutable environment, It is best practice, to get logs off servers and on to a centralized location as quickly as possible, because all servers must be considered ephemeral in the cloud. True or False
#19. Access controls in the cloud should be implemented in all of the layers except.
#20. Data passes through an encryption proxy before being sent to the SaaS application is known as?
#21. This publicly available high-level SOC report contains a statement from an independent CPA that a SOC engagement was performed.
#22. Container systems usually consist of the following except.
#23. Responsible for overseeing business and billing administration, purchasing cloud services, and requesting audit reports when necessary.as well as processing financial transactions
#24. A workload is a unit of processing. It can be executed on a physical server, on a virtual server, or in a container. True or False
#25. Includes the policy, process, and internal controls that direct how an organization is run, relies on the compliance function to ensure that directives are being followed.
#26. Difference between REST API’s and SOAP API’s are?
Select all that apply: