Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

How is encryption managed on multi-tenant storage?

A.

Single key for all data owners

B.

One key per data owner

C.

Multiple keys per data owner

D.

The answer could be A, B, or C depending on the provider

E.

C for data subject to the EU Data Protection Directive; B for all others

CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in

their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?

A.

Policies and procedures shall be established for managing the risks associated with applying changes to business-critical or customer (tenant)-impacting (physical and virtual) applications and system-system interface (API) designs and configurations, infrastructure network and systems components.

B.

Policies and procedures shall be established, and supporting business processes and technical measures implemented, to restrict the installation of unauthorized software on organizationally-owned ormanaged user end-point devices (e.g. issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.

C.

All cloud-based services used by the company's mobile devices or BYOD shall be pre-approved for usage and the storage of company business data.

D.

None of the above

Which cloud deployment model involves a cloud and a datacenter, bound together by technology to enable data and application portability?

A.

Hybrid cloud

B.

Public cloud

C.

Multi-cloud

D.

Private cloud

Which cloud storage technology is basically a virtual hard drive for instanced or VMs?

A.

Volume storage

B.

Platform

C.

Database

D.

Application

E.

Object storage

Which feature in cloud enhances security by isolating deployments similar to deploying in distinct data centers?

A.

A single deployment for all applications

B.

Shared deployments for similar applications

C.

Randomized deployment configurations

D.

Multiple independent deployments for applications

In the Software-as-a-service relationship, who is responsible for the majority of the security?

A.

Application Consumer

B.

Database Manager

C.

Application Developer

D.

Cloud Provider

E.

Web Application CISO

CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?

A.

Submit the CCM on behalf of the CSP to CSA Security, Trust & Assurance Registry (STAR), a free, publicly accessible registry that documents the security controls provided by CSPs

B.

Use CCM to build a detailed list of requirements and controls that they want their CSP to implement

C.

Use CCM to help assess the risk associated with the CSP

D.

None of the above

What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors?

A.

The physical location of the data and how it is accessed

B.

The fragmentation and encryption algorithms employed

C.

The language of the data and how it affects the user

D.

The implications of storing complex information on simple storage systems

E.

The actual size of the data and the storage format

What is the primary role of Identity and Access Management (IAM)?

A.

To encrypt data at rest and in transit

B.

Ensure only authorized entities access resources

C.

To monitor and log all user activities and traffic

D.

Ensure all users have the same level of access

Which of the following best describes an authoritative source in the context of identity management?

A.

A list of permissions assigned to different users

B.

A network resource that handles authorization requests

C.

A database containing all entitlements

D.

A trusted system holding accurate identity information