Refresh The Page to Try Again!!!

 
QUIZ START

#1. The primary security responsibilities of the cloud provider in compute virtualization are to enforce isolation and maintain a secure virtualization infrastructure. True or False.

#2. Rackspace, Microsoft’s Azure, and Amazon Web Services (AWS) are examples of?

#3. The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or by a third party and may be located on-premises or off premises.

#4. What are the six stages of the Data Life Cycle?

#5. What are the components of PaaS Encryption (choose all that apply)

Select all that apply:

#6. A standard template for cloud providers to document their security and compliance controls is known as?

#7. Acts as the glue that binds the technologies together and enables management and configuration remotely of a customer’s cloud environment.

#8. A NIST document that describes the process for accrediting and cryptosystems for use by the US federal government.

#9. The cloud customer is basically only involved in uploading and processing data in the production environment

#10. A content delivery network (CDN) is a form of data caching, usually near geophysical locations of high use/demand, for copies of data commonly requested by user. True or False

#11. The production percentage service level that needs to be restored to meet BCDR objectives in the case of a failure is known as?

#12. The three methods of data discovery are the following.

#13. Provides development or application platforms, such as databases, application platforms (e.g. a place to run Python, PHP, or other code),

#14. Legal Frameworks Governing Data Protection and Privacy are rooted primarily in location of cloud provider,cloud user, data subject and servers, True or False?

#15. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or by a third party and may be located on-premises or off-premises.

#16. Includes visualizations and descriptions used to explain cloud security concepts and principles, such as the CSA logical model in this document

#17. Cloud Data Access Controls include all but the following.

#18. The key difference between cloud and traditional computing is the metastructure. True or False.

#19. The core components of a computing system: compute, network, and storage is known as?

#20. Establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored data.

#21. A Cloud Access Security Broker(CASB), can handle IAM and key management services for cloud customers, True or False?

#22. Full application that’s managed and hosted by the provider. Consumers access it with a web browser, mobile app, or a lightweight client app.

#23. Which of the following is not a method of enforcing Lifecycle Management Security?

#24. Multitenant environments; multiple customers will share the underlying resources that are owned and operated by the provider.

#25. The protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.

#26. The Cloud Security Alliance provides two tools for cloud security concepts and principles. (Choose Two)

Select all that apply:

#27. Which of the following is NOT a Cloud security model?

#28. Used for Security Availability, processing integrity, and privacy, the controls of an org are in line with security

#29. ITAR is a Department of State program. EAR is a Commerce Department program, True or False?

#30. Infrastructure as a Service represents the closest that Cloud comes to a traditional data center True or False.

#31. Widely considered to be the gold standard when it comes to security of information systems and their data.

#32. General Data Protection Regulation (GDPR) includes the following except.

#33. The transfer of data from the European Union to the US,It addresses concerns regarding the expansive data collection activities of U.S. intelligence agencies.

#34. Privacy laws are either Omnibus-covers all categories of personal data or sectoral;covers only specific categories of personal data. True or False

#35. Application security encompasses the following except.

Previous
Finish

Results

Good Job You’re On Your Way!!

You’re NOT ready!!
Get Back to the Books!!