You are the IT director for an automotive parts supply distribution service; your company wants to operate a production environment in the cloud. In reviewing provider options, management considers an offer from Cloud Services Corp., who has contracts with several cloud providers and data centers and has offered to tailor a package of services for your company’s needs. In this case, Cloud Services Corp. is considered a _______________.
You are the IT director for an automotive parts supply distribution service; your company wants to operate a production environment in the cloud. Management has expressed a concern that any cloud provider the company chooses will have your company at a disadvantage—that your company will be at great risk because the provider will have your data and operational capability, and that the provider could hold the data “hostage” in order to raise the price of the service dramatically at the end of the contract term. To address management’s concerns, you should try to find a cloud offering that places a great deal of emphasis on the _______________ trait of cloud computing.
You are the IT director for an automotive parts supply distribution service; your company wants to operate a production environment in the cloud. As you consider possible providers, you are careful to check that they each offer the essential traits of cloud computing. These include all of the following except _______________.
You are the IT director for an automotive parts supply distribution service; your company wants to operate a production environment in the cloud. Your company wants to install its own software solutions in a managed environment to decrease the cost of purchasing and maintaining the hardware of a data center. You should most likely be considering a(n) _______________ offering.
If a company wanted to retain some of its own internal traditional hardware but use the cloud as a means of performing software testing functions, which service and deployment models should it probably use?
A company wants to absolutely minimize their involvement in administration of IT; which combination of cloud service model and deployment should it consider?
During a cost–benefit analysis, your company determines that it spends a disproportionate amount of money on software licensing and administration. Which cloud model may best help your company to reduce these costs?
Your company does not have a well-trained, experienced IT staff and is reluctant to spend more money on training personnel (in recent company history, personnel have received training and then immediately quit the company to work for competitors). If senior management considers cloud migration, which deployment model would probably best suit their needs?
Your company operates under a high degree of regulatory scrutiny. Senior management wants to migrate to a cloud environment but is concerned that providers will not meet the company’s compliance needs. Which deployment model would probably best suit the company’s needs?
Your company operates in a highly competitive market, with extremely high-value data assets. Senior management wants to migrate to a cloud environment but is concerned that providers will not meet the company’s security needs. Which deployment model would probably best suit the company’s needs?
Your company operates in a highly cooperative market, with a high degree of information sharing between participants. Senior management wants to migrate to a cloud environment but is concerned that providers will not meet the company’s collaboration needs. Which deployment model would probably best suit the company’s needs?
Your company maintains an on-premises data center for daily production activities but wants to use a cloud service to augment this capability during times of increased demand (cloud bursting). Which deployment model would probably best suit the company’s needs?
A company is considering a cloud migration to a platform as a service (PaaS) environment. Which of the following factors might make the company less likely to choose the cloud environment?
Which mechanism best aids to ensure that the cloud customer receives dependable, consistent performance in the cloud environment?
What is the business advantage of shifting from capital expenditure in an on-premises environment to the operating expenditures of a cloud environment?
A host-based firewall in a virtualized cloud environment might have aspects of all the following types of controls except _______________.
A virtual network interface card (NIC) exists at Layer _______________ of the OSI model.
Which technology is most associated with tunneling?
Secure Shell (SSH) tunneling can include all of the following services except _______________.
Transport Layer Security (TLS) is a session encryption tool that uses _______________ encryption to create a _______________ session key.
Which of the following architecture frameworks was designed for service delivery entities, from the perspective of how they serve customers?
The Cloud Security Alliance (CSA) created the Trusted Cloud Initiative (TCI) to define principles of cloud computing that providers should strive for in order to foster a clear understanding of the cloud marketplace and to enhance that market. Which of the following is not one of the CSA’s TCI fundamental principles?
Data loss prevention or data leak protection (DLP) solutions typically involve all of the following aspects except _______________.
A typical data loss prevention or data leak protection (DLP) tool can enhance the organization’s efforts at accomplishing what legal task?
Which of the following activities can enhance the usefulness and abilities of a data loss prevention or data leak protection (DLP) solution?
Data archiving can also provide what production capability?
Data archiving can be required for regulatory compliance as a legal mandate. What other business function is also often tied to archiving?
Which of the following is probably most important to include in a data archiving policy?
The destruction of a cloud customer’s data can be required by all of the following except _______________.
Which of the following data storage types is most associated with software as a service (SaaS)?
You are the security manager for a bookkeeping firm that is considering moving to a cloud-based production environment. In selecting a cloud provider, your company is reviewing many criteria. One of these is enhancing the company’s business continuity and disaster recovery (BC/DR) capabilities. You want to ensure that the cloud provider you select will allow for migration to an alternate provider in the event of contingencies. The provider you choose should be able to support a migration to an alternate provider within _______________.
In which phase of the cloud secure data lifecycle does data leave the production environment and go into long-term storage?
In which phase of the cloud secure data lifecycle should classifications and labels be assigned to data?
Which of the following is not included in the Open Web Application Security Project (OWASP) Top Ten web application security threats?
Your organization is developing software for wide use by the public. You have decided to test it in a cloud environment, in a platform as a service (PaaS) model. Which of the following should be of particular concern to your organization for this situation?
Which of the following management risks can make an organization’s cloud environment unviable?
You are the security manager for a company that is considering cloud migration to an infrastructure as a service (IaaS) environment. You are assisting your company’s IT architects in constructing the environment. Which of the following options do you recommend?
Your company uses a managed cloud service provider to host the production environment. The provider has notified you, along with several other of the provider’s customers, that an engineer working for the provider has been using administrative access to steal sensitive data and has been selling it to your competitors. Some of this sensitive data included personally identifiable information (PII) related to your employees. Your company’s general counsel informs you that there are at least three jurisdictions involved that have laws requiring data breach notification for PII. Who has legal liability for the costs involved with making the required notifications?
Which of the following techniques is not recommended for privileged user management?
You are the security officer for a company operating a production environment in the cloud. Your company’s assets have a high degree of sensitivity and value, and your company has decided to retain control and ownership of the encryption key management system. In order to do so, your company will have to have which of the following cloud service/deployment models?
Which security principle dictates that encryption key management and storage should be isolated from the data encrypted with those keys?
Which cloud data storage technique involves encrypting a data set, then splitting the data into pieces, splitting the key into pieces, then signing the data pieces and key pieces and distributing them to various cloud storage locations?
Which theoretical technique would allow encrypted data to be manipulated without decrypting it first?
Which theoretical technology would allow superposition of physical states to increase both computing capacity and encryption keyspace?
In a virtualized environment, suspended virtual machine (VM) instances at rest are subject to increased risk because _______________.
In a virtualized cloud environment, the management plane is usually responsible for provisioning virtual machine instances with all of the following resources except _______________.
Which of the following business continuity and disaster recovery (BC/DR) testing methodologies is least intrusive?
In order for an organization to determine if its backup solution is adequate for meeting the recovery point objective (RPO), what must be done?
Which common characteristic of the cloud data center also serves customer business continuity and disaster recovery (BC/DR) needs?
Which phase of the business continuity and disaster recovery (BC/DR) process can result in a second disaster?
Which process artifact aids an organization in determining the critical assets and functions that need to continue operations during a business continuity and disaster recovery (BC/DR) contingency?
In general, a cloud business continuity and disaster recovery (BC/DR) solution will be _______________ than a physical solution.
Which of the following is not a common federation technology?
Which of the following is an audit report on the design of an organization’s controls?
Which of the following is not usually suitable for inclusion in a service-level agreement (SLA) for managed cloud services?
Which of the following is not a typical physical access control mechanism in the cloud data center?
Which of the following cloud environment accounts should only be granted on a temporary basis?
Which of the following attack vectors is new to the cloud environment and was not typically found in on-premises, legacy environments?
Which of the following is a file server that provides data access to multiple, heterogeneous machines and users on the network?
You are the security manager for a retail company that is considering cloud migration to a public, software as a service (SaaS) solution both for your current internal production environment (an on-premises data center) and to host your e-commerce presence. Which of the following is a new concern you should bring up to senior management for them to consider before the migration?
When a data center is configured such that the backs of the devices face each other and the ambient temperature in the work area is cool, it is called _______________.
Disciplined cable management is crucial for cloud data centers because it provides greater assurance of only authorized lines operating in the environment and _______________.
To optimize airflow within a data center according to industry standards, a raised floor used as an air plenum must have at least _______________ of clearance.
Raised flooring can serve as both an air plenum and _______________.
Typically, when raised flooring is used as an air plenum, _______________ air is directed through it.
There are two general types of smoke detectors. One type uses a light source to detect the presence of particulate matter resulting from a fire, and the other uses _______________.
Fire suppression systems are often linked to a detection system. Common detection systems include all of the following except _______________.
FM-200 has all the following properties except _______________.
FM-200 has all the following properties except _______________.
Dynamic Host Configuration Protocol (DHCP) servers in a network will provide the clients with all of the following except _______________.
You are the security officer for a cloud deployment. In order to secure data in transit, you can choose to implement all of the following techniques and technologies except _______________.
All of the following techniques are used in OS hardening except _______________.
You are performing an audit of the security controls used in a cloud environment. Which of the following would best serve your purpose?
In a cloud environment, prior to putting a node into maintenance mode, all of the following actions should be taken except _______________.
A cloud provider conducting scheduled maintenance of the environment should do all the following except _______________.
Which of the following is characterized by a set maximum capacity?
Which of the following is an open source cloud-based software project characterized by a toolset that includes components called Nova, Neutron, Heat, Ironic, and Cinder?
You are the security director for a call center that provides live support for customers of various vendors. Your staff handles calls regarding refunds, complaints, and the use of products customers have purchased. To process refunds, your staff will have access to purchase information, determine which credit card the customer used, and identify specific elements of personal data. How should you best protect this sensitive data and still accomplish the purpose?
Which of the following is not typically included as a basic phase of the software development lifecycle (SDLC)?
What is the most important input to the software development lifecycle (SDLC)?
Which of the following can be included in the cloud security architecture as a means to identify and reject hostile SQL commands?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Which cloud service or deployment model would probably best suit your needs?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Which of the following tools, technologies, or techniques may be very useful for your purposes?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Previous releases have shipped with major flaws that were not detected in the testing phase; leadership wants to avoid repeating that problem. What tool, technique, or technology might you suggest to aid in identifying programming errors?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Previous releases have shipped with major flaws that were not detected in the testing phase; leadership wants to avoid repeating that problem. It is important to prevent _______________ from being present during the testing.
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Management is interested in adopting an Agile development style. When you explain what impact this will have, you note that _______________ may be decreased by this option.
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Management is interested in adopting an Agile development style. In order for this to happen, the company will have to increase the involvement of _______________.
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Management is interested in adopting an Agile development style. This will be typified by which of the following traits?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Management is interested in adopting an Agile development style. This will be typified by which of the following traits?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. The backend of the software will have the data structured in a way to optimize XML requests. Which API programming style should programmers most likely concentrate on for the frontend interface?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. You recommend the use of STRIDE threat modeling to assess potential risks associated with the software. Which of the following is not addressed by STRIDE?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Management has decided that the company will deploy encryption, data loss prevention or data leak protection (DLP), and digital rights management (DRM) in the cloud environment for additional protection. When consulting with management, you explain that these tools will most likely reduce _______________.
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting its testing environment. Your company has, and wishes to retain, ISO 27034 certification. For every new application it creates, it will also have to create a(n) _______________.
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting a customer-facing production environment. Many of your end users are located in the European Union (EU) and will provide personal data as they use your software. Your company will not be allowed to use a cloud data center in which of the following countries?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting a customer-facing production environment. Many of your end users are located in the European Union (EU) and will provide personal data as they use your software. Your company will not be allowed to use a cloud data center in which of the following countries?
You are the security manager for a software development firm. Your company is interested in using a managed cloud service provider for hosting a customer-facing production environment. Many of your end users are located in the European Union (EU) and will provide personal data as they use your software. Your company will not be allowed to use a cloud data center in which of the following countries?
Which of the following is not a core principle included in the Organisation for Economic Cooperation and Development (OECD) privacy guidelines?
Who is the entity identified by personal data?
What is the current European Union (EU) privacy legislation that restricts dissemination of personal data outside the EU?
In order for American companies to process personal data belonging to European Union (EU) citizens, they must comply with the Privacy Shield program. The program is administered by the U.S. Department of Transportation and the _______________.
In addition to the Privacy Shield program, what other means can non–European Union (EU) companies use to be allowed to process personal data of EU citizens?
Which entity is legally responsible for the protection of personal data?
When a company is first starting and has no defined processes and little documentation, it can be said to be at level _______________ of the Capability Maturity Model (CMM).
Which of the following standards addresses a company’s entire security program, involving all aspects of various security disciplines?
A cloud provider might only release Service Organization Control (SOC 2), Type 2 reports to _______________.
A cloud provider’s Service Organization Control (SOC) 1 report may not be useful to customers interested in determining the provider’s security posture because the SOC 1 report contains only information about _______________.
The Payment Card Industry (PCI) Data Security Standard requires different levels of activity based on participants’ _______________.
Which IT product review framework is intended to determine the accuracy of vendor claims regarding security functions of the product?
What is the lowest level of cryptographic security for a cryptographic module, according to the Federal Information Processing Standard (FIPS) 140-2 standard?
What is the highest level of the Cloud Security Alliance Security, Trust, and Assurance Registry (CSA STAR) certification program for cloud service providers?
Every cloud service provider that opts to join the Cloud Security Alliance Security, Trust, and Assurance Registry (CSA STAR) program registry must complete a _______________.
The term cloud carrier most often refers to _______________.
In a centralized broker identity federation, which entity typically creates and sends the Security Assertion Markup Language (SAML) token?
Which of the following tools incorporates and references the requirements listed in all the others?
Which of the following is an example of true multifactor authentication?
Which of the following is appropriate to include in a service-level agreement (SLA)?
Which of the following standards is typically used to convey public key information in a public-key infrastructure (PKI) arrangement?
In working with various networking technologies such as Frame Relay, ATM, and Ethernet, the capability of the network to provide better service to selected traffic is called _______________.
Which type of networking model is optimized for cloud deployments in which the underlying storage and IP networks are combined so as to maximize the benefits of a cloud workload?
Which type of law consists of a body of rules and statutes that define prohibited conduct and is set out to protect the safety and well-being of the public?
What is the primary reason for the use of SSDs in the cloud today?
Which of the following are risks associated with virtualization?
Which of the following is the core of any system handling all input/output (I/O) instructions?
Which of the following is an international organization of network designers and architects who work together in establishing standards and protocols for the Internet?
_______________ is a symmetric block type of cipher used to encrypt information and is currently the standard for the U.S. government in protecting sensitive and secret documents.
18.226.165.247