Refresh The Page to Try Again!!!
#1. A set of resources (racks, blades, software packages) owned by the single customer but located and maintained at the cloud provider’s data center is a part of?
#2. Outsourcing Key Management Keys should be stored with the data they’re protecting. True or False
#3. Actively scans running applications with penetration tests to detect possible security vulnerabilities.
#4. SaaS solution provides a full multitenant application, with all the architectural complexities of any large software platform. True or False
#5. The transfer of data from the European Union to the US,It addresses concerns regarding the expansive data collection activities of U.S. intelligence agencies.
#6. A guidance document with the primary goal of ensuring that appropriate security requirements and controls are applied to all US federal government information in information management systems
#7. Application security encompasses the following except.
#8. Egress Monitoring (DLP) address which of the following?
Select all that apply:
#9. Widely considered to be the gold standard when it comes to security of information systems and their data.
#10. Cryptographic erasure (cryptoshredding) should be used during this phase of the data life cycle.
#11. Removing the telltale nonspecific identifiers is called? (Data must be marked as sensitive when it is created)
#12. Includes the most change, because it becomes the “virtual infrastructure” that the customer is in complete control of (and responsible for) securing.
#13. ITAR is a Department of State program. EAR is a Commerce Department program, True or False?
#14. Test data generation and Dynamic masking are techniques to protect data used in development and test environments. True or False?
#15. Used for publicly high-level report by an independent CPA, a SOC engagement was performed.
#16. Google Docs, Microsoft’s Office 365, and QuickBooks Online are all examples of what Cloud Service?
#17. What is the fourth stage of the data life cycle?
#18. A standard template for cloud providers to document their security and compliance controls is known as?
#19. Replacing sensitive data with unique identification symbols is known as?
#20. Transparent Database Encryption (TDE) is used in which of the Cloud Service Models.
#21. The Cloud Security Alliance provides two tools for cloud security concepts and principles. (Choose Two)
Select all that apply:
#22. Allows customers to maintain separation between data at rest and encryption keys while still leveraging the power of cloud for compute and analytics.
#23. Which of the following is incorrect, with regards to data storage?
#24. Establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored data.
#25. The protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.
#26. The key difference between cloud and traditional computing is the metastructure. True or False.
#27. Experiences Data lock-in, in the same way as in SaaS, but in this case the onus is completely on the customer to create compatible export routines.
#28. Responsible for peering with other cloud services and providers, as well as overseeing and managing federations and federated services.
#29. A customer uses Private cloud resources for their legacy production environment, accessed remotely by their users, but also employs PaaS function for software development/testing, away from the production environment.
#30. What are the components of IaaS Encryption (choose all that apply)
Select all that apply:
#31. In application security testing involves the following is true, except.
#32. Infrastructure as a Service represents the closest that Cloud comes to a traditional data center True or False.
#33. One of the core tenants of risk management is that you can manage, transfer, accept, or avoid risks. True or False
#34. Full application that’s managed and hosted by the provider. Consumers access it with a web browser, mobile app, or a lightweight client app.
#35. Forces executives to oversee all accounting practices, it also holds them accountable for fraudulent/deceptive activity.
Results
Good Job You’re On Your Way!!
You’re NOT ready!!
Get Back to the Books!!