Loading questions...
Updated
What type of PII is controlled based on laws and carries legal penalties for noncompliance with requirements?
Which if the following is NOT one of the three components of a federated identity system transaction?
Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?
Which of the cloud deployment models requires the cloud customer to be part of a specific group or organization in order to host cloud services within it?
What provides the information to an application to make decisions about the authorization level appropriate when granting access?
What is a standard configuration and policy set that is applied to systems and virtual machines called?
Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?
Which of the cloud cross-cutting aspects relates to the ability to easily move services and applications between different cloud providers?
Which type of audit report is considered a "restricted use" report for its intended audience?
What is the concept of segregating information or processes, within the same system or application, for security reasons?
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?
Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?
Which of the following is the MOST important requirement and guidance for testing during an audit?
Which value refers to the amount of data an organization would need to recover in the event of a BCDR situation in order to reach an acceptable level of operations?
What must SOAP rely on for security?
Which of the following is a commonly used tool for maintaining system configurations?
What type of data does data rights management (DRM) protect?
Which type of testing uses the same strategies and toolsets that hackers would use?
From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions?
Which of the following is NOT a focus or consideration of an internal audit?
Which of the following cloud aspects complicates eDiscovery?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
What is the biggest concern with hosting a key management system outside of the cloud environment?