Refresh The Page to Try Again!!!

 
QUIZ START

#1. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or by a third party and may be located on-premises or off-premises.

#2. Widely considered to be the gold standard when it comes to security of information systems and their data.

#3. Provides development or application platforms, such as databases, application platforms (e.g. a place to run Python, PHP, or other code),

#4. The cloud infrastructure is a composition of two or more clouds (private,community, or public) enables data and application portability.

#5. Which of the following is not one of the five Cloud Characteristics?

#6. Experiences Data lock-in, in the same way as in SaaS, but in this case the onus is completely on the customer to create compatible export routines.

#7. Establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored data.

#8. A guidance document with the primary goal of ensuring that appropriate security requirements and controls are applied to all US federal government information in information management systems

#9. The key difference between cloud and traditional computing is the metastructure. True or False.

#10. The protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.

#11. What is the fourth stage of the data life cycle?

#12. Detects application vulnerabilities by scanning the source code and binaries to detect problems before the code is loaded into memory and run

#13. Uses templates for implementing cloud security, typically generalized (e.g. an IaaS security reference architecture). They can be very abstract, bordering on conceptual, or quite detailed, down to specific controls and functions.

#14. A standard template for cloud providers to document their security and compliance controls is known as?

#15. Includes visualizations and descriptions used to explain cloud security concepts and principles, such as the CSA logical model in this document

#16. Targets US financial and insurance institutions and requires them to protect account holders’ private information.

#17. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.

#18. Privacy laws are either Omnibus-covers all categories of personal data or sectoral;covers only specific categories of personal data. True or False

#19. Allows customers to maintain separation between data at rest and encryption keys while still leveraging the power of cloud for compute and analytics.

#20. Legal Frameworks Governing Data Protection and Privacy are rooted primarily in location of cloud provider,cloud user, data subject and servers, True or False?

#21. Forces executives to oversee all accounting practices, it also holds them accountable for fraudulent/deceptive activity.

#22. General Data Protection Regulation (GDPR) includes the following except.

#23. A content delivery network (CDN) is a form of data caching, usually near geophysical locations of high use/demand, for copies of data commonly requested by user. True or False

#24. Acts as the glue that binds the technologies together and enables management and configuration remotely of a customer’s cloud environment.

#25. The amount of data a company would need to maintain and recover in order to function at a level acceptable to management.

#26. Outsourcing Key Management Keys should be stored with the data they’re protecting. True or False

#27. What are the six stages of the Data Life Cycle?

#28. Includes cloud-based database engines and services such as data warehousing and datamining. (Big data)

#29. The five main phases in secure application design and development include the following except.

#30. Which of the following is NOT a Cloud security model?

#31. Cloud Data Storage Types include all but the following.

#32. The core components of a computing system: compute, network, and storage is known as?

#33. The three methods of data discovery are the following.

#34. You must create and manage your own encryption keys, and you must use your own tools to encrypt data prior to sending it to Cloud Storage.

#35. ITAR is a Department of State program. EAR is a Commerce Department program, True or False?

Finish

Results

Good Job You’re On Your Way!!

You’re NOT ready!!
Get Back to the Books!!