Countermeasures for protecting cloud operations against internal threats include all of the following except:
Which aspect of cloud computing will be most negatively impacted by vendor lock-in?
Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?
SOC Type 1 reports are considered "restricted use," in that they are intended only for limited audiences and purposes.
Which of the following is NOT a population that would be appropriate for a SOC Type 1 report?
What's a potential problem when object storage versus volume storage is used within IaaS for application use and dependency?
Which of the following systems is used to employ a variety of different techniques to discover and alert on threats and potential threats to systems and networks?
From the perspective of compliance, what is the most important consideration when it comes to data center location?
You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?
Which data state would be most likely to use digital signatures as a security protection mechanism?
Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?
Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.
Which role would you be assuming under this directive?
For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?
What concept and operational process must be spelled out clearly, as far as roles and responsibilities go, between the cloud provider and cloud customer for the mitigation of any problems or security events?
IRM solutions allow an organization to place different restrictions on data usage than would otherwise be possible through traditional security controls.
Which of the following controls would be possible with IRM that would not with traditional security controls?
What process is used within a clustered system to provide high availability and load balancing?
During the course of an audit, which of the following would NOT be an input into the control requirements used as part of a gap analysis.
Implementing baselines on systems would take an enormous amount of time and resources if the staff had to apply them to each server, and over time, it would be almost impossible to keep all the systems in sync on an ongoing basis.
Which of the following is NOT a package that can be used for implementing and maintaining baselines across an enterprise?
Where is a DLP solution generally installed when utilized for monitoring data in use?
From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?
Data centers have enormous power resources that are distributed and consumed throughout the entire facility.
Which of the following standards pertains to the proper fire safety standards within that scope?
If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?
Which security concept would business continuity and disaster recovery fall under?
Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.
Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?
Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?
Which of the following service categories entails the least amount of support needed on the part of the cloud customer?
What is the minimum regularity for testing a BCDR plan to meet best practices?
With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?
What provides the information to an application to make decisions about the authorization level appropriate when granting access?
Which of the following is NOT a focus or consideration of an internal audit?
Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?
Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?
Which of the following is the optimal humidity level for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?
Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?
Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?
Which United States law is focused on accounting and financial practices of organizations?
What type of masking strategy involves making a separate and distinct copy of data with masking in place?
Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?
Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?
Which of the following roles involves testing, monitoring, and securing cloud services for an organization?
What is an often overlooked concept that is essential to protecting the confidentiality of data?
What does static application security testing (SAST) offer as a tool to the testers that makes it unique compared to other common security testing methodologies?
The various models generally available for cloud BC/DR activities include all of the following except:
On large distributed systems with pooled resources, cloud computing relies on extensive orchestration to maintain the environment and the constant provisioning of resources.
Which of the following is crucial to the orchestration and automation of networking resources within a cloud?
Which of the following storage types is most closely associated with a database-type storage implementation?
All of the following are techniques to enhance the portability of cloud data, in order to minimize the potential of vendor lock-in except:
Which of the following types of data would fall under data rights management (DRM) rather than information rights management (IRM)?
Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?
From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions?
Which of the following is NOT a function performed by the record protocol of TLS?
What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?
With an API, various features and optimizations are highly desirable to scalability, reliability, and security.
What does the REST API support that the SOAP API does NOT support?
If you are running an application that has strict legal requirements that the data cannot reside on systems that contain other applications or systems, which aspect of cloud computing would be prohibitive in this case?
Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.
Which of the following is the optimal humidity level, as established by ASHRAE?
Which of the following aspects of security is solely the responsibility of the cloud provider?