Refresh The Page to Try Again!!!

 
QUIZ START

#1. Outsourcing Key Management Keys should be stored with the data they’re protecting. True or False

#2. The key difference between cloud and traditional computing is the metastructure. True or False.

#3. Responsible for peering with other cloud services and providers, as well as overseeing and managing federations and federated services.

#4. Protection of consumer media, such as music, publications, video, movies, and so on, is known as what.

#5. A NIST document that describes the process for accrediting and cryptosystems for use by the US federal government.

#6. Categorized and detail specific cloud security controls or categories of controls, such as the CSA CCM

#7. What are the components of PaaS Encryption (choose all that apply)

Select all that apply:

#8. Used for an inspection of the operating effectiveness of the controls.

#9. A customer-managed key allows a cloud customer to manage their own encryption key while the provider manages the encryption engine. True or False?

#10. Experiences Data lock-in, in the same way as in SaaS, but in this case the onus is completely on the customer to create compatible export routines.

#11. A standard template for cloud providers to document their security and compliance controls is known as?

#12. To establish a A Simple Cloud Security Process Model is it best practice to do the following except.

#13. The amount of data a company would need to maintain and recover in order to function at a level acceptable to management.

#14. In Cloud Data Access Controls the management plane consist of the following.

#15. Determining the costs of compliance should which include the following (choose all that apply)

Select all that apply:

#16. The amount of data a company would need to maintain and recover in order to function at a level acceptable to management is known as.

#17. Which of the four methods is not a potential options for handling key management?

#18. Forces executives to oversee all accounting practices, it also holds them accountable for fraudulent/deceptive activity.

#19. Privacy laws are either Omnibus-covers all categories of personal data or sectoral;covers only specific categories of personal data. True or False

#20. Which of the following is not a method of enforcing Lifecycle Management Security?

#21. Establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored data.

#22. The three methods of data discovery are the following.

#23. The core components of a computing system: compute, network, and storage is known as?

#24. a visual representation that helps to illustrate the expected relationship between cause and effect in a financial context

#25. Includes the most change, because it becomes the “virtual infrastructure” that the customer is in complete control of (and responsible for) securing.

#26. The protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.

#27. General Data Protection Regulation (GDPR)

#28. Multitenant environments; multiple customers will share the underlying resources that are owned and operated by the provider.

#29. Legal Frameworks Governing Data Protection and Privacy are rooted primarily in location of cloud provider,cloud user, data subject and servers, True or False?

#30. Data retention policies covers all of the following except.

#31. Replacing sensitive data with unique identification symbols is known as?

#32. The transfer of data from the European Union to the US,It addresses concerns regarding the expansive data collection activities of U.S. intelligence agencies.

#33. Cryptographic erasure (cryptoshredding) should be used during this phase of the data life cycle.

#34. A content delivery network (CDN) is a form of data caching, usually near geophysical locations of high use/demand, for copies of data commonly requested by user. True or False

#35. Lists cloud security controls and maps them to multiple security and compliance standards.

Previous
Finish

Results

Good Job You’re On Your Way!!

You’re NOT ready!!
Get Back to the Books!!

HD Quiz powered by harmonic design