Which of the following tasks within a SaaS environment would NOT be something the cloud customer would be responsible for?
DNSSEC was designed to add a layer of security to the DNS protocol.
Which type of attack was the DNSSEC extension designed to mitigate?
An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?
Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?
Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?
Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.
Which of the following is the optimal temperature range as set by ASHRAE?
Data center and operations design traditionally takes a tiered, topological approach.
Which of the following standards is focused on that approach and is prevalently used throughout the industry?
Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.
Which of the following is NOT a technology for securing data in transit?
With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?
From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?
ISO/IEC has established international standards for many aspects of computing and any processes or procedures related to information technology.
Which ISO/IEC standard has been established to provide a framework for handling eDiscovery processes?
For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?
The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/contractors.
What technology would be useful for protecting data at this point?
Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.
Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?
Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.
What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?
Which of the following aspects of security is solely the responsibility of the cloud provider?
The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.
What does the management plane typically leverage for this orchestration?
Within a SaaS environment, what is the responsibility on the part of the cloud customer in regard to procuring the software used?
When reviewing the BIA after a cloud migration, the organization should take into account new factors related to data breach impacts. One of these new factors is:
Which of the following areas of responsibility would be shared between the cloud customer and cloud provider within the Software as a Service (SaaS) category?
Your new CISO is placing increased importance and focus on regulatory compliance as your applications and systems move into cloud environments.
Which of the following would NOT be a major focus of yours as you develop a project plan to focus on regulatory compliance?
Which of the following is the least challenging with regard to eDiscovery in the cloud?
Your company is in the planning stages of moving applications that have large data sets to a cloud environment.
What strategy for data removal would be the MOST appropriate for you to recommend if costs and speed are primary considerations?
Which of the following is NOT a commonly used communications method within cloud environments to secure data in transit?
A main objective for an organization when utilizing cloud services is to avoid vendor lock-in so as to ensure flexibility and maintain independence.
Which core concept of cloud computing is most related to vendor lock-in?
As a result of scandals involving publicly traded corporations such as Enron, WorldCom, and Adelphi, Congress passed legislation known as:
Many activities within a cloud environment are performed via programmatic means, where complex and distributed operations are handled without the need to perform each step individually.
Which of the following concepts does this describe?
Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution?
Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?
Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?
What is the primary reason that makes resolving jurisdictional conflicts complicated?
What type of masking strategy involves making a separate and distinct copy of data with masking in place?
Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?
Which of the following standards primarily pertains to cabling designs and setups in a data center?
What controls the formatting and security settings of a volume storage system within a cloud environment?
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
Which term relates to the application of scientific methods and practices to evidence?
Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?
Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
User access to the cloud environment can be administered in all of the following ways except:
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance?
Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?
Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?
Which of the following attempts to establish an international standard for eDiscovery processes and best practices?
Which type of audit report is considered a "restricted use" report for its intended audience?
Who would be responsible for implementing IPsec to secure communications for an application?
Which process serves to prove the identity and credentials of a user requesting access to an application or data?
Which of the following is NOT a regulatory system from the United States federal government?
Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?
Which United States law is focused on PII as it relates to the financial industry?
Which United States law is focused on accounting and financial practices of organizations?
Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?
What is a standard configuration and policy set that is applied to systems and virtual machines called?
Which of the following is NOT an application or utility to apply and enforce baselines on a system?
How many additional DNS queries are needed when DNSSEC integrity checks are added?
When an organization is considering the use of cloud services for BCDR planning and solutions, which of the following cloud concepts would be the most important?
Which of the following storage types is most closely associated with a database-type storage implementation?