Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

ENISA: “VM hopping” is:

A.

Improper management of VM instances, causing customer VMs to be commingled with other customer systems.

B.

Looping within virtualized routing systems.

C.

Lack of vulnerability management standards.

D.

Using a compromised VM to exploit a hypervisor, used to take control of other VMs.

E.

Instability in VM patch management causing VM routing errors.

Big data includes high volume, high variety, and high velocity.

A.

False

B.

True

Which of the following best describes how cloud computing manages shared resources?

A.

Through virtualization, with administrators allocating resources based on SLAs

B.

Through abstraction and automation to distribute resources to customers

C.

By allocating physical systems to a single customer at a time

D.

Through manual configuration of resources for each user need

Which Identity and Access Management (IAM) principle focuses on implementing multiple security layers to dilute access power, thereby averting a misuse or compromise?

A.

Continuous Monitoring

B.

Federation

C.

Segregation of Duties

D.

Principle of Least Privilege

Which principle reduces security risk by granting users only the permissions essential for their role?

A.

Role-Based Access Control

B.

Unlimited Access

C.

Mandatory Access Control

D.

Least-Privileged Access

How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?

A.

Use strong multi-factor authentication

B.

Secure backup processes for key management systems

C.

Segregate keys from the provider hosting data

D.

Stipulate encryption in contract language

E.

Select cloud providers within the same country as customer

If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?

A.

It may require a subpoena of the provider directly

B.

It would require a previous access agreement

C.

It would require an act of war

D.

It would require a previous contractual agreement to obtain the application or access to the environment

E.

It would never be obtained in this situation

What are the encryption options available for SaaS consumers?

A.

Any encryption option that is available for volume storage, object storage, or PaaS

B.

Provider-managed and (sometimes) proxy encryption

C.

Client/application and file/folder encryption

D.

Object encryption Volume storage encryption

Which cloud service model typically places the most security responsibilities on the cloud customer?

A.

Platform as a Service (PaaS)

B.

Infrastructure as a Service (IaaS)

C.

The responsibilities are evenly split between cloud provider and customer in all models.

D.

Software as a Service (SaaS)

What is a primary benefit of implementing micro-segmentation within a Zero Trust Architecture?

A.

Simplifies network design and maintenance

B.

Enhances security by isolating workloads from each other

C.

Increases the overall performance of network traffic

D.

Reduces the need for encryption across the network