Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which legal framework is concerned with the privacy of data of EU/EEA citizens?

A.

HIPAA

B.

GDPR

C.

COPPA

D.

APPI

Which countermeasure should be taken during the containment, eradication, and recovery phase of the incident response lifecycle?

A.

Validate alerts

B.

Identify training

C.

Build timeline of attack

D.

Take systems offline

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Which type of risk comes from outsourcing significant vendor-specific investments for data, procedures, or processes to a cloud provider?

A.

Compliance

B.

Lock-in

C.

Overutilization

D.

Exit

In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?

A.

Striping

B.

Archiving

C.

Mapping

D.

Crypto-shredding

Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?

A.

Risk transfer

B.

Vulnerability assessment

C.

Business impact analysis

D.

Out-of-band validation

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Which cloud storage architecture enhances the opportunity for data policy enforcement such as data loss prevention (DLP)?

A.

Object

B.

Flash

C.

Database

D.

Ephemeral

Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?

A.

Acceptance of liability for protection by the transferring entity

B.

Acknowledgement of liability for protection by the entity receiving the data transfer

C.

Demonstration of adequate level of protection similar to GDPR

D.

Formal consent of the data owner

Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?

A.

Archiving and retrieval procedures

B.

Data classification

C.

Local agent checks

D.

Monitoring and enforcement