Refresh The Page to Try Again!!!
QUIZ START
#1. A standard template for cloud providers to document their security and compliance controls is known as?
#2. In Cloud Data Access Controls the management plane consist of the following.
#3. Determining the costs of compliance should which include the following (choose all that apply)
Select all that apply:
#4. The five main phases in secure application design and development include the following except.
#5. Uses templates for implementing cloud security, typically generalized (e.g. an IaaS security reference architecture). They can be very abstract, bordering on conceptual, or quite detailed, down to specific controls and functions.
#6. Cloud Data Access Controls include all but the following.
#7. Egress Monitoring (DLP) address which of the following?
Select all that apply:
#8. Keys are maintained and controlled by the customer at their own location. This offers the highest degree of security for the customer.
#9. A third-party entity offering independent identity and access management (IAM) services to CSPs and cloud customers, often as an intermediary
#10. Outsourcing Key Management Keys should be stored with the data they’re protecting. True or False
#11. What is the fourth stage of the data life cycle?
#12. Test data generation and Dynamic masking are techniques to protect data used in development and test environments. True or False?
#13. Includes the most change, because it becomes the “virtual infrastructure” that the customer is in complete control of (and responsible for) securing.
#14. Multitenant environments; multiple customers will share the underlying resources that are owned and operated by the provider.
#15. Cloud vendor becomes responsible for administering, patching, and updating this software as well as all the infrastructure, computer and storage needs.
#16. The three methods of data discovery are the following.
#17. Data retention policies covers all of the following except.
#18. Google Docs, Microsoft’s Office 365, and QuickBooks Online are all examples of what Cloud Service?
#19. Used for an inspection of the operating effectiveness of the controls.
#20. Which of the following is incorrect, with regards to data storage?
#21. Transparent Database Encryption (TDE) is used in which of the Cloud Service Models.
#22. a visual representation that helps to illustrate the expected relationship between cause and effect in a financial context
#23. What are the components of IaaS Encryption (choose all that apply)
Select all that apply:
#24. Legal Frameworks Governing Data Protection and Privacy are rooted primarily in location of cloud provider,cloud user, data subject and servers, True or False?
#25. Infrastructure as a Service represents the closest that Cloud comes to a traditional data center True or False.
#26. The amount of data a company would need to maintain and recover in order to function at a level acceptable to management is known as.
#27. Actively scans running applications with penetration tests to detect possible security vulnerabilities.
#28. The transfer of data from the European Union to the US,It addresses concerns regarding the expansive data collection activities of U.S. intelligence agencies.
#29. Used for publicly high-level report by an independent CPA, a SOC engagement was performed.
#30. The cloud infrastructure is operated solely for a single organization. It may be managed by the organization or by a third party and may be located on-premises or off premises.
#31. Which of the following is not one of the five Cloud Characteristics?
#32. Cloud customers should also consider implementing some form of egress monitoring in during this phase.
#33. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns. It may be managed by the organizations or by a third party and may be located on-premises or off-premises.
#34. The cloud customer is basically only involved in uploading and processing data in the production environment
#35. Which of the four methods is not a potential options for handling key management?
Finish
Results
Good Job You’re On Your Way!!
You’re NOT ready!!
Get Back to the Books!!