CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.A . Risk Impact B. Domain C. Control SpecificationView AnswerAnswer: C
What is true of searching data across cloud environments?
What is true of searching data across cloud environments?A . You might not have the ability or administrative rights to search or access all hosted data. B. The cloud provider must conduct the search with the full administrative controls. C. All cloud-hosted email accounts are easily searchable. D. Search and...
How does virtualized storage help avoid data loss if a drive fails?
How does virtualized storage help avoid data loss if a drive fails?A . Multiple copies in different locations B. Drives are backed up, swapped, and archived constantly C. Full back ups weekly D. Data loss is unavoidable with drive failures E. Incremental backups dailyView AnswerAnswer: A
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?A . Infrastructure B. Datastructure C. Infostructure D. Applistructure E. MetastructureView AnswerAnswer: A
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:A . Lack of completeness and transparency in terms of use B. Lack of information on jurisdictions C. No source escrow agreement D. Unclear asset ownership E. Audit or certification not available...
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
Which of the following is NOT a cloud computing characteristic that impacts incidence response?A . The on demand self-service nature of cloud computing environments. B. Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident. C. The possibility of data crossing geographic or...
How is encryption managed on multi-tenant storage?
How is encryption managed on multi-tenant storage?A . Single key for all data owners B. One key per data owner C. Multiple keys per data owner D. The answer could be A, B, or C depending on the provider E. C for data subject to the EU Data Protection Directive;...
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?
When investigating an incident in an Infrastructure as a Service (IaaS) environment, what can the user investigate on their own?A . The CSP server facility B. The logs of all customers in a multi-tenant cloud C. The network components controlled by the CSP D. The CSP office spaces E. Their...
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same providerA . False B. TrueView AnswerAnswer: B
If there are gaps in network logging data, what can you do?
If there are gaps in network logging data, what can you do?A . Nothing. There are simply limitations around the data that can be logged in the cloud. B. Ask the cloud provider to open more ports. C. You can instrument the technology stack with your own logging. D. Ask...