Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What must SOAP rely on for security since it does not provide security as a built-in capability?

A.

Encryption

B.

Tokenization

C.

TLS

D.

SSL

With a federated identity system, what does the identity provider send information to after a successful authentication?

A.

Relying party

B.

Service originator

C.

Service relay

D.

Service relay

Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed.

Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?

A.

Disclosure

B.

Transparency

C.

Openness

D.

Documentation

Which type of testing uses the same strategies and toolsets that hackers would use?

A.

Static

B.

Malicious

C.

Penetration

D.

Dynamic

In addition to whatever audit results the provider shares with the customer, what other mechanism does the customer have to ensure trust in the provider’s performance and duties?

A.

HIPAA

B.

The contract

C.

Statutes

D.

Security control matrix

Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.

Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?

A.

Interoperability

B.

Resiliency

C.

Scalability

D.

Portability

All of the following are techniques to enhance the portability of cloud data, in order to minimize the potential of vendor lock-in except:

A.

Ensure there are no physical limitations to moving

B.

Use DRM and DLP solutions widely throughout the cloud operation

C.

Ensure favorable contract terms to support portability

D.

Avoid proprietary data formats

Countermeasures for protecting cloud operations against external attackers include all of the following except:

A.

Continual monitoring for anomalous activity.

B.

Detailed and extensive background checks.

C.

Regular and detailed configuration/change management activities

D.

Hardened devices and systems, including servers, hosts, hypervisors, and virtual machines.

When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:

A.

Many states have data breach notification laws.

B.

Breaches can cause the loss of proprietary data.

C.

Breaches can cause the loss of intellectual property.

D.

Legal liability can’t be transferred to the cloud provider.

Security is a critical yet often overlooked consideration for BCDR planning.

At which stage of the planning process should security be involved?

A.

Scope definition

B.

Requirements gathering

C.

Analysis

D.

Risk assessment

Which component of ITIL pertains to planning, coordinating, executing, and validating changes and rollouts to production environments?

A.

Release management

B.

Availability management

C.

Problem management

D.

Change management

Because of multitenancy, specific risks in the public cloud that don’t exist in the other cloud service models include all the following except:

A.

DoS/DDoS

B.

Information bleed

C.

Risk of loss/disclosure due to legal seizures

D.

Escalation of privilege

The application normative framework is best described as which of the following?

A.

A superset of the ONF

B.

A stand-alone framework for storing security practices for the ONF

C.

The complete ONF

D.

A subnet of the ONF

Identity and access management (IAM) is a security discipline that ensures which of the following?

A.

That all users are properly authorized

B.

That the right individual gets access to the right resources at the right time for the right reasons.

C.

That all users are properly authenticated

D.

That unauthorized users will get access to the right resources at the right time for the right reasons

Which of the following terms is not associated with cloud forensics?

A.

eDiscovery

B.

Chain of custody

C.

Analysis

D.

Plausibility