When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:
Which of the following is a management role, versus a technical role, as it pertains to data management and oversight?
Which of the following is considered an administrative control?
Hardening the operating system refers to all of the following except:
Data masking can be used to provide all of the following functionality, except:
A variety of security systems can be integrated within a network--some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.
Which of the following types of technologies is best described here?
The BIA can be used to provide information about all the following, except:
To address shared monitoring and testing responsibilities in a cloud configuration, the provider might offer all these to the cloud customer except:
Which ITIL component is an ongoing, iterative process of tracking all deployed and configured resources that an organization uses and depends on, whether they are hosted in a traditional data center or a cloud?
Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.
Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?
Your new CISO is placing increased importance and focus on regulatory compliance as your applications and systems move into cloud environments.
Which of the following would NOT be a major focus of yours as you develop a project plan to focus on regulatory compliance?
Which of the following are distinguishing characteristics of a managed service provider?
Countermeasures for protecting cloud operations against external attackers include all of the following except:
Best practices for key management include all of the following, except:
When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.
Which of the following would NOT be something that is predefined as part of the audit agreement?
The goals of SIEM solution implementation include all of the following, except:
What is the intellectual property protection for a confidential recipe for muffins?
To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:
How many additional DNS queries are needed when DNSSEC integrity checks are added?
The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
Which value refers to the percentage of production level restoration needed to meet BCDR objectives?
Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?
What type of security threat is DNSSEC designed to prevent?
What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?
Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?
What does the "SOC" acronym refer to with audit reports?
Which type of testing uses the same strategies and toolsets that hackers would use?
What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?
Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?
Which of the following is the sole responsibility of the cloud provider, regardless of which cloud model is used?
Which of the following is NOT an application or utility to apply and enforce baselines on a system?
Which OSI layer does IPsec operate at?
What type of masking strategy involves replacing data on a system while it passes between the data and application layers?
Which data point that auditors always desire is very difficult to provide within a cloud environment?
What provides the information to an application to make decisions about the authorization level appropriate when granting access?
Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?
Which of the following standards primarily pertains to cabling designs and setups in a data center?
Which United States law is focused on data related to health records and privacy?
What is used for local, physical access to hardware within a data center?
What is the data encapsulation used with the SOAP protocol referred to?
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
What is a serious complication an organization faces from the perspective of compliance with international operations?
What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?
Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?
Within an Infrastructure as a Service model, which of the following would NOT be a measured service?
What does the REST API support that SOAP does NOT support?
How is an object stored within an object storage system?
Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?
Which data formats are most commonly used with the REST API?
When is a virtual machine susceptible to attacks while a physical server in the same state would not be?
What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?
Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?
Where is a DLP solution generally installed when utilized for monitoring data in transit?
Where is a DLP solution generally installed when utilized for monitoring data in use?
Data center and operations design traditionally takes a tiered, topological approach.
Which of the following standards is focused on that approach and is prevalently used throughout the industry?
Modern web service systems are designed for high availability and resiliency. Which concept pertains to the ability to detect problems within a system, environment, or application and programmatically invoke redundant systems or processes for mitigation?
Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.
What type of attack is this?
An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?
Which of the following statements best describes a Type 1 hypervisor?
When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.
What is the data encapsulation used with the SOAP protocol referred to as?
In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.
Which role would you be assuming under this directive?
Which of the following aspects of security is solely the responsibility of the cloud provider?
What does a cloud customer purchase or obtain from a cloud provider?
Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?
Three central concepts define what type of data and information an organization is responsible for pertaining to eDiscovery.
Which of the following are the three components that comprise required disclosure?
If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?
Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.
Which of the following is NOT something that firewalls are concerned with?
Which aspect of SaaS will alleviate much of the time and energy organizations spend on compliance (specifically baselines)?
Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?
Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.
Which concept encapsulates this?