Refresh The Page to Try Again!!!

 
QUIZ START

#1. A set of resources (racks, blades, software packages) owned by the single customer but located and maintained at the cloud provider’s data center is a part of?

#2. Outsourcing Key Management Keys should be stored with the data they’re protecting. True or False

#3. Actively scans running applications with penetration tests to detect possible security vulnerabilities.

#4. SaaS solution provides a full multitenant application, with all the architectural complexities of any large software platform. True or False

#5. The transfer of data from the European Union to the US,It addresses concerns regarding the expansive data collection activities of U.S. intelligence agencies.

#6. A guidance document with the primary goal of ensuring that appropriate security requirements and controls are applied to all US federal government information in information management systems

#7. Application security encompasses the following except.

#8. Egress Monitoring (DLP) address which of the following?

Select all that apply:

#9. Widely considered to be the gold standard when it comes to security of information systems and their data.

#10. Cryptographic erasure (cryptoshredding) should be used during this phase of the data life cycle.

#11. Removing the telltale nonspecific identifiers is called? (Data must be marked as sensitive when it is created)

#12. Includes the most change, because it becomes the “virtual infrastructure” that the customer is in complete control of (and responsible for) securing.

#13. ITAR is a Department of State program. EAR is a Commerce Department program, True or False?

#14. Test data generation and Dynamic masking are techniques to protect data used in development and test environments. True or False?

#15. Used for publicly high-level report by an independent CPA, a SOC engagement was performed.

#16. Google Docs, Microsoft’s Office 365, and QuickBooks Online are all examples of what Cloud Service?

#17. What is the fourth stage of the data life cycle?

#18. A standard template for cloud providers to document their security and compliance controls is known as?

#19. Replacing sensitive data with unique identification symbols is known as?

#20. Transparent Database Encryption (TDE) is used in which of the Cloud Service Models.

#21. The Cloud Security Alliance provides two tools for cloud security concepts and principles. (Choose Two)

Select all that apply:

#22. Allows customers to maintain separation between data at rest and encryption keys while still leveraging the power of cloud for compute and analytics.

#23. Which of the following is incorrect, with regards to data storage?

#24. Establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored data.

#25. The protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.

#26. The key difference between cloud and traditional computing is the metastructure. True or False.

#27. Experiences Data lock-in, in the same way as in SaaS, but in this case the onus is completely on the customer to create compatible export routines.

#28. Responsible for peering with other cloud services and providers, as well as overseeing and managing federations and federated services.

#29. A customer uses Private cloud resources for their legacy production environment, accessed remotely by their users, but also employs PaaS function for software development/testing, away from the production environment.

#30. What are the components of IaaS Encryption (choose all that apply)

Select all that apply:

#31. In application security testing involves the following is true, except.

#32. Infrastructure as a Service represents the closest that Cloud comes to a traditional data center True or False.

#33. One of the core tenants of risk management is that you can manage, transfer, accept, or avoid risks. True or False

#34. Full application that’s managed and hosted by the provider. Consumers access it with a web browser, mobile app, or a lightweight client app.

#35. Forces executives to oversee all accounting practices, it also holds them accountable for fraudulent/deceptive activity.

Previous
Finish

Results

Good Job You’re On Your Way!!

You’re NOT ready!!
Get Back to the Books!!