Refresh The Page to Try Again!!!

 
QUIZ START

#1. The key difference between cloud and traditional computing is the metastructure. True or False.

#2. Lists cloud security controls and maps them to multiple security and compliance standards.

#3. What are the components of IaaS Encryption (choose all that apply)

Select all that apply:

#4. The production percentage service level that needs to be restored to meet BCDR objectives in the case of a failure is known as?

#5. A Cloud Access Security Broker(CASB), can handle IAM and key management services for cloud customers, True or False?

#6. The core components of a computing system: compute, network, and storage is known as?

#7. A NIST document that describes the process for accrediting and cryptosystems for use by the US federal government.

#8. Targets US financial and insurance institutions and requires them to protect account holders’ private information.

#9. Which of the following is not a method of enforcing Lifecycle Management Security?

#10. Includes cloud-based database engines and services such as data warehousing and datamining. (Big data)

#11. The cloud infrastructure is a composition of two or more clouds (private,community, or public) enables data and application portability.

#12. Outsourcing Key Management Keys should be stored with the data they’re protecting. True or False

#13. It is best practice to identify requirements, design the architecture, and then identify the gaps based on the capabilities of the underlying cloud platform. True or False

#14. Establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored data.

#15. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or by a third party and may be located on-premises or off-premises.

#16. Widely considered to be the gold standard when it comes to security of information systems and their data.

#17. The vendor will be responsible for patching, administering, and updating the OS.

#18. Keys are maintained and controlled by the customer at their own location. This offers the highest degree of security for the customer.

#19. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.

#20. The five main phases in secure application design and development include the following except.

#21. To establish a A Simple Cloud Security Process Model is it best practice to do the following except.

#22. Transparent Database Encryption (TDE) is used in which of the Cloud Service Models.

#23. The applications deployed in the cloud and the underlying application services used to build them.

#24. What are the six stages of the Data Life Cycle?

#25. Includes visualizations and descriptions used to explain cloud security concepts and principles, such as the CSA logical model in this document

#26. Forces executives to oversee all accounting practices, it also holds them accountable for fraudulent/deceptive activity.

#27. Used for publicly high-level report by an independent CPA, a SOC engagement was performed.

#28. Cloud Data Storage Types include all but the following.

#29. Rackspace, Microsoft’s Azure, and Amazon Web Services (AWS) are examples of?

#30. Cloud Data Access Controls include all but the following.

#31. a visual representation that helps to illustrate the expected relationship between cause and effect in a financial context

#32. In application security testing involves the following is true, except.

#33. The cloud customer is basically only involved in uploading and processing data in the production environment

#34. Experiences Data lock-in, in the same way as in SaaS, but in this case the onus is completely on the customer to create compatible export routines.

#35. The amount of data a company would need to maintain and recover in order to function at a level acceptable to management is known as.

Previous
Finish

Results

Good Job You’re On Your Way!!

You’re NOT ready!!
Get Back to the Books!!