Which of the following is not a component of contractual PII?
AScope of processing
BValue of data
CLocation of data
DUse of subcontractors
Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.
Which of the following compromise the two facets of computing?
ACPU and software
BCPU and storage
CCPU and memory
DMemory and networking
Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?
AStorage
BApplication
CMamory
DCPU
Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user's valid credentials?
AInjection
BMissing function-level access control
CCross-site scripting
DCross-site request forgery
Which of the following roles involves the provisioning and delivery of cloud services?
ACloud service deployment manager
BCloud service business manager
CCloud service manager
DCloud service operations manager
What are the U.S. Commerce Department controls on technology exports known as?
AITAR
BDRM
CEAR
DEAL
A UPS should have enough power to last how long?
AOne day
B12 hours
CLong enough for graceful shutdown
D10 minutes
Which of the following statements about Type 1 hypervisors is true?
AThe hardware vendor and software vendor are different.
BThe hardware vendor and software vendor are the same
CThe hardware vendor provides an open platform for software vendors.
DThe hardware vendor and software vendor should always be different for the sake of security.
The WS-Security standards are built around all of the following standards except which one?
ASAML
BWDSL
CXML
DSOAP
What are the U.S. State Department controls on technology exports known as?
ADRM
BITAR
CEAR
DEAL
Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?
AConsumable service
BMeasured service
CBillable service
DMetered service
Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?
ACloud service user
BCloud service business manager
CCloud service administrator
DCloud service integrator
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
ACryptographic erasure
BZeroing
COverwriting
DDeletion
Which of the following cloud aspects complicates eDiscovery?
AResource pooling
BOn-demand self-service
CMultitenancy
DMeasured service
What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?
AScripts
BRDP
CAPIs
DXML
Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?
AMetered service
BMeasured billing
CMetered billing
DMeasured service
When using a PaaS solution, what is the capability provided to the customer?
ATo deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The provider does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
BTo deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
CTo deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools that the consumer supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
DTo deploy onto the cloud infrastructure provider-created or acquired applications created using programming languages, libraries, services, and tools that the provider supports. The consumer does not manage or control the underlying cloud infrastructure, including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
Which of the following roles involves testing, monitoring, and securing cloud services for an organization?
ACloud service integrator
BCloud service business manager
CCloud service user
DCloud service administrator
Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
AResource pooling
BVirtualization
CMultitenancy
DRegulation
A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it's best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within a cloud.
What is the biggest advantage to leasing space in a data center versus procuring cloud services?
ARegulations
BControl
CSecurity
DCosts
What is the biggest concern with hosting a key management system outside of the cloud environment?
AConfidentiality
BPortability
CAvailability
DIntegrity
When crafting plans and policies for data archiving, we should consider all of the following, except:
AThe backup process
BImmediacy of the technology
CArchive location
DThe format of the data
Which of the following is NOT a factor that is part of a firewall configuration?
AEncryption
BPort
CProtocol
DSource IP
Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?
AInjection
BCross-site request forgery
CMissing function-level access control
DCross-site scripting
Which of the following is NOT a criterion for data within the scope of eDiscovery?