What must SOAP rely on for security since it does not provide security as a built-in capability?
With a federated identity system, what does the identity provider send information to after a successful authentication?
Being in a cloud environment, cloud customers lose a lot of insight and knowledge as to how their data is stored and their systems are deployed.
Which concept from the ISO/IEC cloud standards relates to the necessity of the cloud provider to inform the cloud customer on these issues?
Which type of testing uses the same strategies and toolsets that hackers would use?
In addition to whatever audit results the provider shares with the customer, what other mechanism does the customer have to ensure trust in the provider’s performance and duties?
Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.
Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?
All of the following are techniques to enhance the portability of cloud data, in order to minimize the potential of vendor lock-in except:
Countermeasures for protecting cloud operations against external attackers include all of the following except:
When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:
Security is a critical yet often overlooked consideration for BCDR planning.
At which stage of the planning process should security be involved?
Which component of ITIL pertains to planning, coordinating, executing, and validating changes and rollouts to production environments?
Because of multitenancy, specific risks in the public cloud that don’t exist in the other cloud service models include all the following except:
The application normative framework is best described as which of the following?
Identity and access management (IAM) is a security discipline that ensures which of the following?
Which of the following terms is not associated with cloud forensics?