Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?
Which tool provides a dedicated environment to contain and analyze malware?
Which platform component includes containers and storage?
In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?
Which process is implemented during the hardening of an operating system (OS) and its workloads?
Which phase of the cloud data lifecycle implements the file, block, or object type of cloud architecture?
Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?
Which general body of law covers data breach violations in a cloud environment at a federal agency?
Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?
What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?
Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?
In which service model would the cloud service provider bear the greatest responsibility for security?
Which cloud model is owned and operated by a vendor and then sold, leased, or rented to someone else?
Which activity is within the scope of the cloud provider’s role in the chain of custody?
Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?
A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?
An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?
Which security information and event management concept focuses on account and service hijacking issues?
What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?
Which type of risk comes from outsourcing significant vendor-specific investments for data, procedures, or processes to a cloud provider?
Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?
Which cloud computing service model allows customers to run their own application code without configuring the server environment?
A company is interested in tokenization as an alternative to protecting data without encryption. The application will soon store the token. Which step should occur immediately before this action?
Which cloud model allows an on-premises data center to use cloud bursting?
Which guide remedies the challenge of the international nature of cloud forensics and is known for becoming the premier standard for eDiscovery?
Which data retention policy addresses how long data must be retained to meet regulatory requirements?
Which key management option typically needs to be on-premises and delivers the keys to the cloud over a dedicated connection?
Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?
Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?
Which group should be notified for approval when a planned modification to an environment is scheduled?
A breach caused by lack of security management resulted in a civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight. Who should be contacted?
Which cloud computing characteristic allows consumers to expand or contract required resources automatically?
Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?
Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?
Which jurisdictional protection factor should be known if personally identifiable information (PII) is to be stored in the cloud?
An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?
Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?
Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?
An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?
Which risk is unique to the public cloud?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
Which cloud architecture model provides application development services?
Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?
An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?
Which phase of the cloud data life cycle involves the process of crypto-shredding?
Which aspect of strong authentication is part of enterprise risk management?
An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?
Which subject matter expert is relied upon to draft policies related to the organization’s operations in the cloud?
Which regulation restricts the government from forcing a cloud service provider to disclose customer data?
An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?
Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?
Which U.S. standard is used by federal government agencies to manage enterprise risk?
Which cloud model provides retention of governance controls to a large company with legacy systems?
Which security concept requires continuous identity and authorization checks to allow access to data?
What should be done to data during the create phase of the data life cycle before being uploaded to the cloud?
Which entity provides common directory services?
An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?
An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?
Which risk relates to the removal of a person’s information within the public cloud by legal authorities?
Which regulation provides a guide for implementing the risk management framework?
Which option should a cloud architect recommend to an organization looking to simplify development and management of applications?