Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is not a risk management framework?

A.

COBIT

B.

Hex GBL

C.

ISO 31000:2009

D.

NIST SP 800-37

What are the two protocols that TLS uses?

A.

Handshake and record

B.

Transport and initiate

C.

Handshake and transport

D.

Record and transmit

Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?

A.

PLAN

B.

WAN

C.

LAN

D.

VLAN

Which of the following does NOT relate to the hiding of sensitive data from data sets?

A.

Obfuscation

B.

Federation

C.

Masking

D.

Anonymization

Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?

A.

Modifying metadata

B.

Importing data

C.

Modifying data

D.

Constructing new data

Which of the following attempts to establish an international standard for eDiscovery processes and best practices?

A.

ISO/IEC 31000

B.

ISO/IEC 27050

C.

ISO/IEC 19888

D.

ISO/IEC 27001

Which of the following statements accurately describes VLANs?

A.

They are not restricted to the same data center or the same racks.

B.

They are not restricted to the name rack but restricted to the same data center.

C.

They are restricted to the same racks and data centers.

D.

They are not restricted to the same rack but restricted to same switches.

When is a virtual machine susceptible to attacks while a physical server in the same state would not be?

A.

When it is behind a WAF

B.

When it is behind an IPS

C.

When it is not patched

D.

When it is powered off

Which of the following is not a component of contractual PII?

A.

Scope of processing

B.

Value of data

C.

Location of data

D.

Use of subcontractors

Which of the following is considered an internal redundancy for a data center?

A.

Power distribution units

B.

Network circuits

C.

Power substations

D.

Generators

Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?

A.

Cloud service manager

B.

Cloud service deployment

C.

Cloud service business manager

D.

Cloud service operations manager

What is the biggest concern with hosting a key management system outside of the cloud environment?

A.

Confidentiality

B.

Portability

C.

Availability

D.

Integrity

What controls the formatting and security settings of a volume storage system within a cloud environment?

A.

Management plane

B.

SAN host controller

C.

Hypervisor

D.

Operating system of the host

What is used for local, physical access to hardware within a data center?

A.

SSH

B.

KVM

C.

VPN

D.

RDP

Which of the following standards primarily pertains to cabling designs and setups in a data center?

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute