Which protocol, as a part of TLS, handles negotiating and establishing a connection between two parties?
Which of the following storage types is most closely associated with a database-type storage implementation?
Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?
Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
Which of the following attempts to establish an international standard for eDiscovery processes and best practices?
What must be secured on physical hardware to prevent unauthorized access to systems?
Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used?
Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?
If you're using iSCSI in a cloud environment, what must come from an external protocol or application?
What type of PII is controlled based on laws and carries legal penalties for noncompliance with requirements?
Which of the following is considered an external redundancy for a data center?
Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
Which technique involves replacing values within a specific data field to protect sensitive data?
From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?
Which of the following roles is responsible for peering with other cloud services and providers?
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?
Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?
Which value refers to the percentage of production level restoration needed to meet BCDR objectives?
Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?
Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?
Which data point that auditors always desire is very difficult to provide within a cloud environment?
Which crucial aspect of cloud computing can be most threatened by insecure APIs?
The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.
What does the management plane typically leverage for this orchestration?
Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.
Which of the following is NOT a technology for securing data in transit?
Which data state would be most likely to use TLS as a protection mechanism?
Which of the following is NOT an application or utility to apply and enforce baselines on a system?
Which security concept would business continuity and disaster recovery fall under?
What does static application security testing (SAST) offer as a tool to the testers?
In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?
Which of the following is NOT one of the components of multifactor authentication?
The BIA can be used to provide information about all the following, except:
A variety of security systems can be integrated within a network--some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.
Which of the following types of technologies is best described here?
What's a potential problem when object storage versus volume storage is used within IaaS for application use and dependency?
Which of the following is the least challenging with regard to eDiscovery in the cloud?
Data masking can be used to provide all of the following functionality, except:
Which protocol, as a part of TLS, handles the actual secure communications and transmission of data?
Security is a critical yet often overlooked consideration for BCDR planning.
At which stage of the planning process should security be involved?
What does static application security testing (SAST) offer as a tool to the testers that makes it unique compared to other common security testing methodologies?
The WS-Security standards are built around all of the following standards except which one?
When using an IaaS solution, what is a key benefit provided to the customer?
As a result of scandals involving publicly traded corporations such as Enron, WorldCom, and Adelphi, Congress passed legislation known as:
There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the stricter requirements.
Which US program was designed to help companies overcome these differences?
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.
What is the term associated with this determination?
Where is a DLP solution generally installed when utilized for monitoring data in use?
Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.
Which of the following is the optimal humidity level, as established by ASHRAE?
With a federated identity system, where would a user perform their authentication when requesting services or application access?
If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?
Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.
Which of the following is the optimal temperature range as set by ASHRAE?
An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?
Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?
Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?
Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?
Where is a DLP solution generally installed when utilized for monitoring data at rest?
One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.
Which aspect of cloud computing makes this particular component more challenging than in a traditional data center?
A DLP solution/implementation has three main components.
Which of the following is NOT one of the three main components?
Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?
Which European Union directive pertains to personal data privacy and an individual's control over their personal data?
Which of the cloud cross-cutting aspects relates to the requirements placed on the cloud provider by the cloud customer for minimum performance standards and requirements that must be met?
Which of the following is NOT a focus or consideration of an internal audit?
What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?
Which process serves to prove the identity and credentials of a user requesting access to an application or data?