Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?A . Planned Outages B. Resiliency Planning C. Expected Engineering D. Chaos Engineering E. Organized DowntimeView AnswerAnswer: D
security policies and various legal requirements, such as regulatory and legislative?
Which governance domain deals with evaluating how cloud computing affects compliance with internal security policies and various legal requirements, such as regulatory and legislative?A . Legal Issues: Contracts and Electronic Discovery B. Infrastructure Security C. Compliance and Audit Management D. Information Governance E. Governance and Enterprise Risk ManagementView AnswerAnswer: C
What is true of companies considering a cloud computing business relationship?
What is true of companies considering a cloud computing business relationship?A . The laws protecting customer data are based on the cloud provider and customer location only. B. The confidentiality agreements between companies using cloud computing services is limited legally to the company, not the provider. C. The companies using...
Your SLA with your cloud provider ensures continuity for all services.
Your SLA with your cloud provider ensures continuity for all services.A . False B. TrueView AnswerAnswer: A
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?
CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?A . Risk Impact B. Domain C. Control SpecificationView AnswerAnswer: B
ENISA: A reason for risk concerns of a cloud provider being acquired is:
ENISA: A reason for risk concerns of a cloud provider being acquired is:A . Arbitrary contract termination by acquiring company B. Resource isolation may fail C. Provider may change physical location D. Mass layoffs may occur E. Non-binding agreements put at riskView AnswerAnswer: E
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?A . Volume storage B. Platform C. Database D. Application E. Object storageView AnswerAnswer: A
Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in their production environment. Which of the following Change Control & Configuration Management production environment specific control should...
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.A . False B. TrueView AnswerAnswer: B
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
ENISA: An example high risk role for malicious insiders within a Cloud Provider includesA . Sales B. Marketing C. Legal counsel D. Auditors E. AccountingView AnswerAnswer: D