Refresh The Page to Try Again!!!
#1. The key difference between cloud and traditional computing is the metastructure. True or False.
#2. Lists cloud security controls and maps them to multiple security and compliance standards.
#3. What are the components of IaaS Encryption (choose all that apply)
Select all that apply:
#4. The production percentage service level that needs to be restored to meet BCDR objectives in the case of a failure is known as?
#5. A Cloud Access Security Broker(CASB), can handle IAM and key management services for cloud customers, True or False?
#6. The core components of a computing system: compute, network, and storage is known as?
#7. A NIST document that describes the process for accrediting and cryptosystems for use by the US federal government.
#8. Targets US financial and insurance institutions and requires them to protect account holders’ private information.
#9. Which of the following is not a method of enforcing Lifecycle Management Security?
#10. Includes cloud-based database engines and services such as data warehousing and datamining. (Big data)
#11. The cloud infrastructure is a composition of two or more clouds (private,community, or public) enables data and application portability.
#12. Outsourcing Key Management Keys should be stored with the data they’re protecting. True or False
#13. It is best practice to identify requirements, design the architecture, and then identify the gaps based on the capabilities of the underlying cloud platform. True or False
#14. Establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored data.
#15. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or by a third party and may be located on-premises or off-premises.
#16. Widely considered to be the gold standard when it comes to security of information systems and their data.
#17. The vendor will be responsible for patching, administering, and updating the OS.
#18. Keys are maintained and controlled by the customer at their own location. This offers the highest degree of security for the customer.
#19. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
#20. The five main phases in secure application design and development include the following except.
#21. To establish a A Simple Cloud Security Process Model is it best practice to do the following except.
#22. Transparent Database Encryption (TDE) is used in which of the Cloud Service Models.
#23. The applications deployed in the cloud and the underlying application services used to build them.
#24. What are the six stages of the Data Life Cycle?
#25. Includes visualizations and descriptions used to explain cloud security concepts and principles, such as the CSA logical model in this document
#26. Forces executives to oversee all accounting practices, it also holds them accountable for fraudulent/deceptive activity.
#27. Used for publicly high-level report by an independent CPA, a SOC engagement was performed.
#28. Cloud Data Storage Types include all but the following.
#29. Rackspace, Microsoft’s Azure, and Amazon Web Services (AWS) are examples of?
#30. Cloud Data Access Controls include all but the following.
#31. a visual representation that helps to illustrate the expected relationship between cause and effect in a financial context
#32. In application security testing involves the following is true, except.
#33. The cloud customer is basically only involved in uploading and processing data in the production environment
#34. Experiences Data lock-in, in the same way as in SaaS, but in this case the onus is completely on the customer to create compatible export routines.
#35. The amount of data a company would need to maintain and recover in order to function at a level acceptable to management is known as.
Results
Good Job You’re On Your Way!!
You’re NOT ready!!
Get Back to the Books!!