Refresh The Page to Try Again!!!
#1. Provides development or application platforms, such as databases, application platforms (e.g. a place to run Python, PHP, or other code),
#2. Uses templates for implementing cloud security, typically generalized (e.g. an IaaS security reference architecture). They can be very abstract, bordering on conceptual, or quite detailed, down to specific controls and functions.
#3. General Data Protection Regulation (GDPR) includes the following except.
#4. What are the components of PaaS Encryption (choose all that apply)
Select all that apply:
#5. A third-party entity offering independent identity and access management (IAM) services to CSPs and cloud customers, often as an intermediary
#6. Allows customers to maintain separation between data at rest and encryption keys while still leveraging the power of cloud for compute and analytics.
#7. A customer uses Private cloud resources for their legacy production environment, accessed remotely by their users, but also employs PaaS function for software development/testing, away from the production environment.
#8. Responsible for peering with other cloud services and providers, as well as overseeing and managing federations and federated services.
#9. Categorized and detail specific cloud security controls or categories of controls, such as the CSA CCM
#10. Removing the telltale nonspecific identifiers is called? (Data must be marked as sensitive when it is created)
#11. The core components of a computing system: compute, network, and storage is known as?
#12. Targets US financial and insurance institutions and requires them to protect account holders’ private information.
#13. Multitenant environments; multiple customers will share the underlying resources that are owned and operated by the provider.
#14. Test data generation and Dynamic masking are techniques to protect data used in development and test environments. True or False?
#15. Lists cloud security controls and maps them to multiple security and compliance standards.
#16. A NIST document that describes the process for accrediting and cryptosystems for use by the US federal government.
#17. a visual representation that helps to illustrate the expected relationship between cause and effect in a financial context
#18. Experiences Data lock-in, in the same way as in SaaS, but in this case the onus is completely on the customer to create compatible export routines.
#19. In Cloud Data Access Controls the management plane consist of the following.
#20. The protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.
#21. Keys are maintained and controlled by the customer at their own location. This offers the highest degree of security for the customer.
#22. What is the second stage of the data life cycle?
#23. Protection of consumer media, such as music, publications, video, movies, and so on, is known as what.
#24. Widely considered to be the gold standard when it comes to security of information systems and their data.
#25. Cryptographic erasure (cryptoshredding) should be used during this phase of the data life cycle.
#26. Application security encompasses the following except.
#27. Google Docs, Microsoft’s Office 365, and QuickBooks Online are all examples of what Cloud Service?
#28. To establish a A Simple Cloud Security Process Model is it best practice to do the following except.
#29. What are the six stages of the Data Life Cycle?
#30. Forces executives to oversee all accounting practices, it also holds them accountable for fraudulent/deceptive activity.
#31. A provider owns the underlying infrastructure, but it’s provisioned and made available solely for the use of the specific community is known as.
#32. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
#33. Legal Frameworks Governing Data Protection and Privacy are rooted primarily in location of cloud provider,cloud user, data subject and servers, True or False?
#34. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or by a third party and may be located on-premises or off-premises.
#35. Egress Monitoring (DLP) address which of the following?
Select all that apply:
Results
Good Job You’re On Your Way!!
You’re NOT ready!!
Get Back to the Books!!