Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?
Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?A . IPSB . WAFC . DLPD . IDSView AnswerAnswer: C Explanation: Data loss prevention (DLP) can be applied to data that is...
Which of the following is considered an internal redundancy for a data center?
Which of the following is considered an internal redundancy for a data center?A . Power feedsB . ChillersC . Network circuitsD . GeneratorsView AnswerAnswer: B Explanation: Chillers and cooling systems are internal to a data center and its operations, and as such they are considered an internal redundancy. Power feeds,...
Which United States law is focused on accounting and financial practices of organizations?
Which United States law is focused on accounting and financial practices of organizations?A . Safe HarborB . GLBAC . SOXD . HIPAAView AnswerAnswer: C Explanation: The Sarbanes-Oxley (SOX) Act is not an act that pertains to privacy or IT security directly, but rather regulates accounting and financial practices used by...
Which of the following is the MOST important requirement and guidance for testing during an audit?
Which of the following is the MOST important requirement and guidance for testing during an audit?A . StakeholdersB . ShareholdersC . ManagementD . RegulationsView AnswerAnswer: D Explanation: During any audit, regulations are the most important factor and guidelines for what must be tested. Although the requirements from management, stakeholders, and...
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?A . IaaSB . DaaSC . SaaSD . PaaSView AnswerAnswer: C Explanation: With many SaaS implementations, data is not isolated to a particular customer but rather is part...
Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?
Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?A . InjectionB . Missing function-level access controlC . Cross-site scriptingD . Cross-site request forgeryView AnswerAnswer: D Explanation: Explanation Cross-site scripting (XSS) is an attack...
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?A . PlatformB . InfrastructureC . SoftwareD . DesktopView AnswerAnswer: C Explanation: The software service capability gives the cloud customer a fully established application, where only minimal user configuration options are allowed.
Which of the following cloud aspects complicates eDiscovery?
Which of the following cloud aspects complicates eDiscovery?A . Resource poolingB . On-demand self-serviceC . MultitenancyD . Measured serviceView AnswerAnswer: C Explanation: With multitenancy, eDiscovery becomes more complicated because the data collection involves extra steps to ensure that only those customers or systems that are within scope are turned over...
Which of the following storage types is most closely associated with a database-type storage implementation?
Which of the following storage types is most closely associated with a database-type storage implementation?A . ObjectB . UnstructuredC . VolumeD . StructuredView AnswerAnswer: D Explanation: Structured storage involves organized and categorized data, which most closely resembles and operates like a database system would.
Which of the following is the optimal humidity level, as established by ASHRAE?
Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance. Which of the following is the optimal humidity level, as established by ASHRAE?A . 20 to 40 percent relative humidityB . 50...