Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?

A.

Cloud provider

B.

Instance provider

C.

Cloud controller

D.

UniFi controller

A warning system identifies an impending disaster. When should failover occur to ensure continuity of operations?

A.

Prior to the crisis event

B.

During the resumption of normal activities

C.

During the crisis event

D.

Prior to the resumption of normal activities

Which characteristic of cloud computing refers to sharing physical assets among multiple customers?

A.

Rapid scalability

B.

On-demand self-service

C.

Resource pooling

D.

Measured service

Which service model requires the most consumer responsibility for security issues?

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Database as a Service (DBaaS)

D.

Infrastructure as a Service (IaaS)

Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?

A.

The Gramm-Leach-Bliley Act (GLBA)

B.

The General Data Protection Regulation (GDPR)

C.

The Sarbanes-Oxley (SOX) Act

D.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

Which requirement in the Gramm-Leach-Bliley Act (GLBA) is included to protect private data?

A.

Independent auditor

B.

Gap analysis

C.

Information security plan

D.

Limited scope definition

As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?

A.

Location-based

B.

Content-based

C.

Label-based

D.

Metadata-based

Which activity is within the scope of the cloud provider’s role in the chain of custody?

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Which business continuity and disaster recovery consideration should be part of a cloud application architecture?

A.

Architecting for failure

B.

Health status pages

C.

Compliance of applications

D.

Application message queues