What is the concept of segregating information or processes, within the same system or application, for security reasons?
Which of the following is a commonly used tool for maintaining system configurations?
What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?
What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?
What is an often overlooked concept that is essential to protecting the confidentiality of data?
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.
Which role would you be assuming under this directive?
Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?
One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.
Which aspect of cloud computing makes this particular component more challenging than in a traditional data center?
For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?
Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.
What type of attack is this?
Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.
Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?
If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?
Which of the following systems is used to employ a variety of different techniques to discover and alert on threats and potential threats to systems and networks?
The European Union is often considered the world leader in regard to the privacy of personal data and has declared privacy to be a " human right. "
In what year did the EU first assert this principle?
You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.
Which of the following would be the most appropriate action to take first?
Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?
Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?
What is the intellectual property protection for a useful manufacturing innovation?
Data masking can be used to provide all of the following functionality, except:
In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?
Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.
Which of the following is the optimal temperature range as set by ASHRAE?
Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?
Which of the following threat types involves the sending of invalid and manipulated requests through a user ' s client to execute commands on the application under their own credentials?
Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?
Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?
Which cloud deployment model would be ideal for a group of universities looking to work together, where each university can gain benefits according to its specific needs?
There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the stricter requirements.
Which US program was designed to help companies overcome these differences?
Which of the following tasks within a SaaS environment would NOT be something the cloud customer would be responsible for?
Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?
Within a federated identity system, which entity accepts tokens from the identity provider?
Data centers have enormous power resources that are distributed and consumed throughout the entire facility.
Which of the following standards pertains to the proper fire safety standards within that scope?
You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?
DNSSEC was designed to add a layer of security to the DNS protocol.
Which type of attack was the DNSSEC extension designed to mitigate?
Where is an XML firewall most commonly and effectively deployed in the environment?
Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?
Which aspect of archiving must be tested regularly for the duration of retention requirements?
The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it ' s used with the hypervisors.
What does the management plane typically leverage for this orchestration?
If a key feature of cloud computing that your organization desires is the ability to scale and expand without limit or concern about available resources, which cloud deployment model would you MOST likely be considering?
Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?
When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.
What is the data encapsulation used with the SOAP protocol referred to as?
Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?
A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it ' s best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within a cloud.
What is the biggest advantage to leasing space in a data center versus procuring cloud services?
Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.
What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?
Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?
Different certifications and standards take different approaches to data center design and operations. Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?
Which cloud deployment model is MOST likely to offer free or very cheap services to users?
Data center and operations design traditionally takes a tiered, topological approach.
Which of the following standards is focused on that approach and is prevalently used throughout the industry?
What is the cloud service model in which the customer is responsible for administration of the OS?
Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
Which of the following storage types is most closely associated with a database-type storage implementation?
Which aspect of cloud computing will be most negatively impacted by vendor lock-in?
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
What expectation of data custodians is made much more challenging by a cloud implementation, especially with PaaS or SaaS?
Which United States law is focused on accounting and financial practices of organizations?
Which type of cloud model typically presents the most challenges to a cloud customer during the " destroy " phase of the cloud data lifecycle?
What type of segregation and separation of resources is needed within a cloud environment for multitenancy purposes versus a traditional data center model?
Which of the following represents a minimum guaranteed resource within a cloud environment for the cloud customer?
Which term relates to the application of scientific methods and practices to evidence?
Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?
What type of masking strategy involves making a separate and distinct copy of data with masking in place?
Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?
From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?
Which of the following roles involves the provisioning and delivery of cloud services?
What is the biggest benefit to leasing space in a data center versus building or maintain your own?
Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?
Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:
Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
Without the extensive funds of a large corporation, a small-sized company could gain considerable and cost-effective services for which of the following concepts by moving to a cloud environment?
You need to gain approval to begin moving your company ' s data and systems into a cloud environment. However, your CEO has mandated the ability to easily remove your IT assets from the cloud provider as a precondition.
Which of the following cloud concepts would this pertain to?
What is the intellectual property protection for the tangible expression of a creative idea?
Which of the following is the best example of a key component of regulated PII?
Your IT steering committee has, at a high level, approved your project to begin using cloud services. However, the committee is concerned with getting locked into a single cloud provider and has flagged the ability to easily move between cloud providers as a top priority. It also wants to save costs by reusing components.
Which cross-cutting aspect of cloud computing would be your primary focus as your project plan continues to develop and you begin to evaluate cloud providers?
Proper implementation of DLP solutions for successful function requires which of the following?
As a result of scandals involving publicly traded corporations such as Enron, WorldCom, and Adelphi, Congress passed legislation known as:
A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?
Which protocol operates at the network layer and provides for full point-to-point encryption of all communications and transmissions?
BCDR strategies do not typically involve the entire operations of an organization, but only those deemed critical to their business.
Which concept pertains to the amount of services that need to be recovered to meet BCDR objectives?
Which component of ITIL involves the creation of an RFC ticket and obtaining official approvals for it?
On large distributed systems with pooled resources, cloud computing relies on extensive orchestration to maintain the environment and the constant provisioning of resources.
Which of the following is crucial to the orchestration and automation of networking resources within a cloud?
Because of multitenancy, specific risks in the public cloud that don’t exist in the other cloud service models include all the following except:
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
The GAPP framework was developed through a joint effort between the major Canadian and American professional accounting associations in order to assist their members with managing and preventing risks to the privacy of their data and customers.
Which of the following is the meaning of GAPP?
In a cloud environment, encryption should be used for all the following, except:
A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.
However, what is one consideration that is often overlooked with the formulation of a BCDR plan?
Countermeasures for protecting cloud operations against external attackers include all of the following except:
Which of the following could be used as a second component of multifactor authentication if a user has an RSA token?
The goals of SIEM solution implementation include all of the following, except:
All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except:
Cloud systems are increasingly used for BCDR solutions for organizations.
What aspect of cloud computing makes their use for BCDR the most attractive?
Which component of ITIL involves planning for the restoration of services after an unexpected outage or incident?
To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:
The cloud customer will have the most control of their data and systems, and the cloud provider will have the least amount of responsibility, in which cloud computing arrangement?
Which protocol, as a part of TLS, handles the actual secure communications and transmission of data?
What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?
Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?
Which of the following is the biggest concern or challenge with using encryption?
Which is the appropriate phase of the cloud data lifecycle for determining the data ' s classification?
Which of the following threat types involves an application developer leaving references to internal information and configurations in code that is exposed to the client?
Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?
Which of the cloud cross-cutting aspects relates to the ability for a cloud customer to easily remove their applications and data from a cloud environment?
The SOC Type 2 reports are divided into five principles.
Which of the five principles must also be included when auditing any of the other four principles?
Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?
Which if the following is NOT one of the three components of a federated identity system transaction?
At which stage of the BCDR plan creation phase should security be included in discussions?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management ' s objectives?
Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?
Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?
Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?
The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?
Which of the following service categories entails the least amount of support needed on the part of the cloud customer?
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
Which data point that auditors always desire is very difficult to provide within a cloud environment?
Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?
Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?
What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?
What process is used within a clustered system to provide high availability and load balancing?
Which European Union directive pertains to personal data privacy and an individual ' s control over their personal data?