A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?
An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?
An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?
Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?
An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?
Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?
Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?
Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?
Which tool provides a dedicated environment to contain and analyze malware?
As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?
An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?
Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?
An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
Which characteristic of cloud computing refers to sharing physical assets among multiple customers?
Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?
Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?
Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?
An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?