Refresh The Page to Try Again!!!
#1. The primary security responsibilities of the cloud provider in compute virtualization are to enforce isolation and maintain a secure virtualization infrastructure. True or False.
#2. Rackspace, Microsoft’s Azure, and Amazon Web Services (AWS) are examples of?
#3. The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or by a third party and may be located on-premises or off premises.
#4. What are the six stages of the Data Life Cycle?
#5. What are the components of PaaS Encryption (choose all that apply)
Select all that apply:
#6. A standard template for cloud providers to document their security and compliance controls is known as?
#7. Acts as the glue that binds the technologies together and enables management and configuration remotely of a customer’s cloud environment.
#8. A NIST document that describes the process for accrediting and cryptosystems for use by the US federal government.
#9. The cloud customer is basically only involved in uploading and processing data in the production environment
#10. A content delivery network (CDN) is a form of data caching, usually near geophysical locations of high use/demand, for copies of data commonly requested by user. True or False
#11. The production percentage service level that needs to be restored to meet BCDR objectives in the case of a failure is known as?
#12. The three methods of data discovery are the following.
#13. Provides development or application platforms, such as databases, application platforms (e.g. a place to run Python, PHP, or other code),
#14. Legal Frameworks Governing Data Protection and Privacy are rooted primarily in location of cloud provider,cloud user, data subject and servers, True or False?
#15. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or by a third party and may be located on-premises or off-premises.
#16. Includes visualizations and descriptions used to explain cloud security concepts and principles, such as the CSA logical model in this document
#17. Cloud Data Access Controls include all but the following.
#18. The key difference between cloud and traditional computing is the metastructure. True or False.
#19. The core components of a computing system: compute, network, and storage is known as?
#20. Establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored data.
#21. A Cloud Access Security Broker(CASB), can handle IAM and key management services for cloud customers, True or False?
#22. Full application that’s managed and hosted by the provider. Consumers access it with a web browser, mobile app, or a lightweight client app.
#23. Which of the following is not a method of enforcing Lifecycle Management Security?
#24. Multitenant environments; multiple customers will share the underlying resources that are owned and operated by the provider.
#25. The protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.
#26. The Cloud Security Alliance provides two tools for cloud security concepts and principles. (Choose Two)
Select all that apply:
#27. Which of the following is NOT a Cloud security model?
#28. Used for Security Availability, processing integrity, and privacy, the controls of an org are in line with security
#29. ITAR is a Department of State program. EAR is a Commerce Department program, True or False?
#30. Infrastructure as a Service represents the closest that Cloud comes to a traditional data center True or False.
#31. Widely considered to be the gold standard when it comes to security of information systems and their data.
#32. General Data Protection Regulation (GDPR) includes the following except.
#33. The transfer of data from the European Union to the US,It addresses concerns regarding the expansive data collection activities of U.S. intelligence agencies.
#34. Privacy laws are either Omnibus-covers all categories of personal data or sectoral;covers only specific categories of personal data. True or False
#35. Application security encompasses the following except.
Results
Good Job You’re On Your Way!!
You’re NOT ready!!
Get Back to the Books!!