Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:
All the following are data analytics modes, except:
SOC Type 1 reports are considered "restricted use," in that they are intended only for limited audiences and purposes.
Which of the following is NOT a population that would be appropriate for a SOC Type 1 report?
What is the intellectual property protection for the tangible expression of a creative idea?
Which kind of SSAE audit report is a cloud customer most likely to receive from a cloud provider?
The cloud customer will have the most control of their data and systems, and the cloud provider will have the least amount of responsibility, in which cloud computing arrangement?
Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.
Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?
What concept and operational process must be spelled out clearly, as far as roles and responsibilities go, between the cloud provider and cloud customer for the mitigation of any problems or security events?
Which of the following is NOT one of the components of multifactor authentication?
The baseline should cover which of the following?
What is a key capability or characteristic of PaaS?
BCDR strategies do not typically involve the entire operations of an organization, but only those deemed critical to their business.
Which concept pertains to the amount of services that need to be recovered to meet BCDR objectives?
As a result of scandals involving publicly traded corporations such as Enron, WorldCom, and Adelphi, Congress passed legislation known as:
When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.
Which of the following is NOT one of the three main approaches to data discovery?
To address shared monitoring and testing responsibilities in a cloud configuration, the provider might offer all these to the cloud customer except:
Which kind of SSAE audit report is most beneficial for a cloud customer, even though it’s unlikely the cloud provider will share it?
Which of the following is considered a physical control?
What is the cloud service model in which the customer is responsible for administration of the OS?
What type of solution is at the core of virtually all directory services?
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?
What is the concept of segregating information or processes, within the same system or application, for security reasons?
Which attribute of data poses the biggest challenge for data discovery?
Which of the following is NOT a factor that is part of a firewall configuration?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
What concept does the "T" represent in the STRIDE threat model?
Which of the following is the MOST important requirement and guidance for testing during an audit?
What provides the information to an application to make decisions about the authorization level appropriate when granting access?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?
Which type of testing uses the same strategies and toolsets that hackers would use?
Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?
Which of the following is NOT a focus or consideration of an internal audit?
Which regulatory system pertains to the protection of healthcare data?
Which of the following would NOT be a reason to activate a BCDR strategy?
Which of the following is NOT an application or utility to apply and enforce baselines on a system?
Which security concept would business continuity and disaster recovery fall under?
Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?
For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?
Which of the following is considered an internal redundancy for a data center?
With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?
Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?
Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.
Which of the following is NOT a technology for securing data in transit?
Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?
Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?
Which data state would be most likely to use digital signatures as a security protection mechanism?
Different certifications and standards take different approaches to data center design and operations. Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?
Within a SaaS environment, what is the responsibility on the part of the cloud customer in regard to procuring the software used?
If a key feature of cloud computing that your organization desires is the ability to scale and expand without limit or concern about available resources, which cloud deployment model would you MOST likely be considering?
Which of the following is NOT one of the main intended goals of a DLP solution?
You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?
Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?
When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.
What is the data encapsulation used with the SOAP protocol referred to as?
Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
Which of the following is NOT a regulatory system from the United States federal government?
Which technology is NOT commonly used for security with data in transit?
What is the primary reason that makes resolving jurisdictional conflicts complicated?
Which technique involves replacing values within a specific data field to protect sensitive data?
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
Which of the following roles involves the provisioning and delivery of cloud services?
From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?
What is the best source for information about securing a physical asset's BIOS?
Which of the following is NOT a criterion for data within the scope of eDiscovery?
Which of the following is not a risk management framework?
What is the biggest concern with hosting a key management system outside of the cloud environment?
Which of the following standards primarily pertains to cabling designs and setups in a data center?
What is the biggest negative to leasing space in a data center versus building or maintain your own?
Which United States law is focused on PII as it relates to the financial industry?
Which United States law is focused on data related to health records and privacy?
Which protocol does the REST API depend on?
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?