Which aspect of data poses the biggest challenge to using automated tools for data discovery and programmatic data classification?
When a system needs to be exposed to the public Internet, what type of secure system would be used to perform only the desired operations?
The different cloud service models have varying levels of responsibilities for functions and operations depending with the model's level of service.
In which of the following models would the responsibility for patching lie predominantly with the cloud customer?
Which component of ITIL involves planning for the restoration of services after an unexpected outage or incident?
Each of the following are dependencies that must be considered when reviewing the BIA after cloud migration except:
Many aspects of cloud computing bring enormous benefits over a traditional data center, but also introduce new challenges unique to cloud computing.
Which of the following aspects of cloud computing makes appropriate data classification of high importance?
Which of the following storage types is most closely associated with a database-type storage implementation?
Security is a critical yet often overlooked consideration for BCDR planning.
At which stage of the planning process should security be involved?
What type of masking would you employ to produce a separate data set for testing purposes based on production data without any sensitive information?
Just like the risk management process, the BCDR planning process has a defined sequence of steps and processes to follow to ensure the production of a comprehensive and successful plan.
Which of the following is the correct sequence of steps for a BCDR plan?
With a federated identity system, what does the identity provider send information to after a successful authentication?
Limits for resource utilization can be set at different levels within a cloud environment to ensure that no particular entity can consume a level of resources that impacts other cloud customers.
Which of the following is NOT a unit covered by limits?
Which type of testing uses the same strategies and toolsets that hackers would use?
Countermeasures for protecting cloud operations against external attackers include all of the following except:
Which protocol, as a part of TLS, handles negotiating and establishing a connection between two parties?
Which of the following is NOT one of the components of multifactor authentication?
Identity and access management (IAM) is a security discipline that ensures which of the following?
User access to the cloud environment can be administered in all of the following ways except:
BCDR strategies typically do not involve the entire operations of an organization, but only those deemed critical to their business.
Which concept pertains to the required amount of time to restore services to the predetermined level?
What's a potential problem when object storage versus volume storage is used within IaaS for application use and dependency?
Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?
Within an Infrastructure as a Service model, which of the following would NOT be a measured service?
Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
Which of the following roles is responsible for peering with other cloud services and providers?
Which aspect of cloud computing makes data classification even more vital than in a traditional data center?
Which value refers to the percentage of production level restoration needed to meet BCDR objectives?
Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?
Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?
Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed?
Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?
From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions?
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?
Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?
Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?
What process is used within a clustered system to provide high availability and load balancing?
Which European Union directive pertains to personal data privacy and an individual's control over their personal data?
Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?
Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?
Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?
Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?
From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?
What is a serious complication an organization faces from the perspective of compliance with international operations?
Which of the following attempts to establish an international standard for eDiscovery processes and best practices?
Which aspect of cloud computing will be most negatively impacted by vendor lock-in?
DLP can be combined with what other security technology to enhance data controls?
Which crucial aspect of cloud computing can be most threatened by insecure APIs?
SOC Type 1 reports are considered "restricted use," in that they are intended only for limited audiences and purposes.
Which of the following is NOT a population that would be appropriate for a SOC Type 1 report?
An audit scope statement defines the limits and outcomes from an audit.
Which of the following would NOT be included as part of an audit scope statement?
A variety of security systems can be integrated within a network--some that just monitor for threats and issue alerts, and others that take action based on signatures, behavior, and other types of rules to actively stop potential threats.
Which of the following types of technologies is best described here?
What is the concept of isolating an application from the underlying operating system for testing purposes?
Your company is in the planning stages of moving applications that have large data sets to a cloud environment.
What strategy for data removal would be the MOST appropriate for you to recommend if costs and speed are primary considerations?
With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?
Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?
Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.
What term pertains to the application of scientific norms and protocols to digital investigations?
Where is a DLP solution generally installed when utilized for monitoring data in transit?
Within a federated identity system, which entity accepts tokens from the identity provider?
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
From the perspective of compliance, what is the most important consideration when it comes to data center location?
If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?
Which of the following systems is used to employ a variety of different techniques to discover and alert on threats and potential threats to systems and networks?
Jurisdictions have a broad range of privacy requirements pertaining to the handling of personal data and information.
Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?
Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?
With an API, various features and optimizations are highly desirable to scalability, reliability, and security.
What does the REST API support that the SOAP API does NOT support?
Which data state would be most likely to use digital signatures as a security protection mechanism?
Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?
There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the stricter requirements.
Which US program was designed to help companies overcome these differences?
Many aspects and features of cloud computing can make eDiscovery compliance more difficult or costly.
Which aspect of cloud computing would be the MOST complicating factor?
If you are running an application that has strict legal requirements that the data cannot reside on systems that contain other applications or systems, which aspect of cloud computing would be prohibitive in this case?
With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.
What is the term associated with this determination?
What is a serious complication an organization faces from the compliance perspective with international operations?
Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.
Which of the following is NOT a technology for securing data in transit?
Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.
Which of the following is the optimal temperature range as set by ASHRAE?
Within a SaaS environment, what is the responsibility on the part of the cloud customer in regard to procuring the software used?
Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?
Data center and operations design traditionally takes a tiered, topological approach.
Which of the following standards is focused on that approach and is prevalently used throughout the industry?
You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.
Which of the following would be the most appropriate action to take first?
Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.
Which of the following is the optimal humidity level, as established by ASHRAE?
One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.
Which aspect of cloud computing makes this particular component more challenging than in a traditional data center?
An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?
Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?
When dealing with PII, which category pertains to those requirements that can carry legal sanctions or penalties for failure to adequately safeguard the data and address compliance requirements?
Where is a DLP solution generally installed when utilized for monitoring data in use?
Where is a DLP solution generally installed when utilized for monitoring data at rest?
In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?
With a federated identity system, where would a user perform their authentication when requesting services or application access?
Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
With IaaS, what is responsible for handling the security and control over the volume storage space?
The SOC Type 2 reports are divided into five principles.
Which of the five principles must also be included when auditing any of the other four principles?
Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?
Which value refers to the amount of data an organization would need to recover in the event of a BCDR situation in order to reach an acceptable level of operations?
Which approach is typically the most efficient method to use for data discovery?
Which of the following is the MOST important requirement and guidance for testing during an audit?
What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?
Which of the following is a widely used tool for code development, branching, and collaboration?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?
Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?
Which crucial aspect of cloud computing can be most threatened by insecure APIs?
Who would be responsible for implementing IPsec to secure communications for an application?
What is a standard configuration and policy set that is applied to systems and virtual machines called?
Which of the following APIs are most commonly used within a cloud environment?
Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?
Which of the following is considered an internal redundancy for a data center?
Which United States law is focused on data related to health records and privacy?
What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?
What controls the formatting and security settings of a volume storage system within a cloud environment?
Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?
What must be secured on physical hardware to prevent unauthorized access to systems?
Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?
What type of PII is regulated based on the type of application or per the conditions of the specific hosting agreement?
What is the biggest benefit to leasing space in a data center versus building or maintain your own?
Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?
Which of the following represents a minimum guaranteed resource within a cloud environment for the cloud customer?
If you're using iSCSI in a cloud environment, what must come from an external protocol or application?