Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is the primary purpose of an SOC 3 report?

A.

HIPAA compliance

B.

Absolute assurances

C.

Seal of approval

D.

Compliance with PCI/DSS

Every security program and process should have which of the following?

A.

Severe penalties

B.

Multifactor authentication

C.

Foundational policy

D.

Homomorphic encryption

When using a PaaS solution, what is the capability provided to the customer?

A.

To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The provider does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

B.

To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

C.

To deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the consumer supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

D.

To deploy onto the cloud infrastructure provider-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.

In the cloud motif, the data processor is usually:

A.

The cloud customer

B.

The cloud provider

C.

The cloud access security broker

D.

The party that assigns access rights

Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:

A.

Full inventory

B.

Criticality

C.

Value

D.

Usefulness

Which of the following best describes data masking?

A.

A method for creating similar but inauthentic datasets used for software testing and user training.

B.

A method used to protect prying eyes from data such as social security numbers and credit card data.

C.

A method where the last few numbers in a dataset are not obscured. These are often used for authentication.

D.

Data masking involves stripping out all digits in a string of numbers so as to obscure the original number.

Which of the following is considered an administrative control?

A.

Keystroke logging

B.

Access control process

C.

Door locks

D.

Biometric authentication

Which of the following terms is NOT a commonly used category of risk acceptance?

A.

Moderate

B.

Critical

C.

Minimal

D.

Accepted

Which aspect of data poses the biggest challenge to using automated tools for data discovery and programmatic data classification?

A.

Quantity

B.

Language

C.

Quality

D.

Number of courses

What is a key capability or characteristic of PaaS?

A.

Support for a homogenous environment

B.

Support for a single programming language

C.

Ability to reduce lock-in

D.

Ability to manually scale

The most pragmatic option for data disposal in the cloud is which of the following?

A.

Cryptoshredding

B.

Overwriting

C.

Cold fusion

D.

Melting

Apart from using encryption at the file system level, what technology is the most widely used to protect data stored in an object storage system?

A.

TLS

B.

HTTPS

C.

VPN

D.

IRM

A variety of security systems can be integrated within a network--some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.

Which of the following types of technologies is best described here?

A.

IDS

B.

IPS

C.

Proxy

D.

Firewall

Which of the following is considered a technological control?

A.

Firewall software

B.

Firing personnel

C.

Fireproof safe

D.

Fire extinguisher

A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.

However, what is one consideration that is often overlooked with the formulation of a BCDR plan?

A.

Availability of staff

B.

Capacity at the BCDR site

C.

Restoration of services

D.

Change management processes