Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?

A.

The Statement on Standards for Attestation Engagements (SSAE) 18

B.

The International Standard on Review Engagements (ISRE) 2400

C.

The Statement on Standards for Accounting and Review Services (SSARS) 25

D.

The International Standard on Assurance Engagements (ISAE) 3402

Which security control is a countermeasure against vendor lock-in and lock-out?

A.

Offsite backups

B.

Video surveillance

C.

Disk redundancy

D.

Training programs

Which security threat occurs when authorized users increase their level of access in an unauthorized manner?

A.

Escalation of privilege

B.

Man-in-the-middle

C.

Role assumption

D.

Segregation of duties

What is a core goal of operating system (OS) baseline compliance and monitoring?

A.

Meet the required service levels as specified in the SLA

B.

Isolate customer traffic traveling over multi-tenant networks

C.

Separate customer data in multi-tenant hosting environments

D.

Ensure virtual images satisfy baseline configuration requirements

A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?

A.

Staging

B.

Code review

C.

Code testing

D.

Rollback

Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?

A.

Jurisdiction of the cloud provider and users

B.

Level of encryption that the cloud solution provides

C.

Configuration details specified in the contract

D.

Penalties specified in the service level agreement

An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?

A.

Consider options for portability and interoperability

B.

Enable multiple zones to mitigate service disruptions

C.

Revise contractual and personnel obligations

D.

Use best tools to securely connect to the cloud

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

A.

It should destroy them only if the contract includes hardware disposal insurance.

B.

It should use cryptographic erasure to securely remove any personal data from the drives.

C.

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.

It should use degaussing tools to securely remove any personal data from the drives.

A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?

A.

Hashing

B.

Encryption

C.

Masking

D.

Tokenization