Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

ISO/IEC has established international standards for many aspects of computing and any processes or procedures related to information technology.

Which ISO/IEC standard has been established to provide a framework for handling eDiscovery processes?

A.

ISO/IEC 27001

B.

ISO/IEC 27002

C.

ISO/IEC 27040

D.

ISO/IEC 27050

You just hired an outside developer to modernize some applications with new web services and functionality. In order to implement a comprehensive test platform for validation, the developer needs a data set that resembles a production data set in both size and composition.

In order to accomplish this, what type of masking would you use?

A.

Development

B.

Replicated

C.

Static

D.

Dynamic

Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.

What term pertains to the application of scientific norms and protocols to digital investigations?

A.

Scientific

B.

Investigative

C.

Methodological

D.

Forensics

What does a cloud customer purchase or obtain from a cloud provider?

A.

Services

B.

Hosting

C.

Servers

D.

Customers

Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.

Which of the following is NOT a technology for securing data in transit?

A.

VPN

B.

TLS

C.

DNSSEC

D.

HTTPS

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?

A.

Inter-cloud provider

B.

Cloud service business manager

C.

Cloud service administrator

D.

Cloud service integrator

Which of the following aspects of security is solely the responsibility of the cloud provider?

A.

Regulatory compliance

B.

Physical security

C.

Operating system auditing

D.

Personal security of developers

If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?

A.

Memory and networking

B.

CPU and software

C.

CPU and storage

D.

CPU and memory

In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?

A.

Archive

B.

Share

C.

Store

D.

Destroy

Which data state would be most likely to use TLS as a protection mechanism?

A.

Data in use

B.

Data at rest

C.

Archived

D.

Data in transit

Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.

Which of the following is NOT something that firewalls are concerned with?

A.

IP address

B.

Encryption

C.

Port

D.

Protocol

DNSSEC was designed to add a layer of security to the DNS protocol.

Which type of attack was the DNSSEC extension designed to mitigate?

A.

Account hijacking

B.

Snooping

C.

Spoofing

D.

Data exposure

Which data state would be most likely to use digital signatures as a security protection mechanism?

A.

Data in use

B.

Data in transit

C.

Archived

D.

Data at rest

Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.

Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?

A.

SOC Type 2, one year

B.

SOC Type 1, one year

C.

SOC Type 2, one month

D.

SOC Type 2, six months

Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.

Which concept encapsulates this?

A.

Validity

B.

Integrity

C.

Accessibility

D.

Confidentiality