A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?
Which security control is a countermeasure against vendor lock-in and lock-out?
Which security threat occurs when authorized users increase their level of access in an unauthorized manner?
What is a core goal of operating system (OS) baseline compliance and monitoring?
A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?
Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?
An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?
A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?
A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?