Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?

A.

Six months

B.

One month

C.

One year

D.

One week

Over time, what is a primary concern for data archiving?

A.

Size of archives

B.

Format of archives

C.

Recoverability

D.

Regulatory changes

What does the "SOC" acronym refer to with audit reports?

A.

Service Origin Confidentiality

B.

System Organization Confidentiality

C.

Service Organizational Control

D.

System Organization Control

What is the minimum regularity for testing a BCDR plan to meet best practices?

A.

Once year

B.

Once a month

C.

Every six months

D.

When the budget allows it

What is an often overlooked concept that is essential to protecting the confidentiality of data?

A.

Strong password

B.

Training

C.

Security controls

D.

Policies

Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?

A.

Platform

B.

Infrastructure

C.

Software

D.

Desktop

Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?

A.

RSL

B.

RPO

C.

SRE

D.

RTO

Which of the cloud cross-cutting aspects relates to the ability to easily move services and applications between different cloud providers?

A.

Reversibility

B.

Availability

C.

Portability

D.

Interoperability

Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?

A.

regulatory requirements

B.

Auditability

C.

Service-level agreements

D.

Governance

What type of security threat is DNSSEC designed to prevent?

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Injection

What type of data does data rights management (DRM) protect?

A.

Consumer

B.

PII

C.

Financial

D.

Healthcare

What changes are necessary to application code in order to implement DNSSEC?

A.

Adding encryption modules

B.

Implementing certificate validations

C.

Additional DNS lookups

D.

No changes are needed.

Which OSI layer does IPsec operate at?

A.

Network

B.

transport

C.

Application

D.

Presentation

What process is used within a clustered system to provide high availability and load balancing?

A.

Dynamic balancing

B.

Dynamic clustering

C.

Dynamic optimization

D.

Dynamic resource scheduling

Which of the following is NOT a function performed by the record protocol of TLS?

A.

Encryption

B.

Acceleration

C.

Authentication

D.

Compression