Topic 1: Exam Pool A
Under EU law, a cloud customer who gives sensitive data to a cloud provider is still
legally responsible for the damages resulting from a data breach caused by the
provider; the EU would say that it is the cloud customer’s fault for choosing the
wrong provider.
This is an example of insufficient ____________.
A.
Proof
B.
Evidence
C.
Due diligence
D.
Application of reasonableness
Due diligence
The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats
to organizations participating in cloud computing.
According to the CSA, what is one reason the threat of insecure interfaces and APIs is so
prevalent in cloud computing?
Response:
A.
Cloud customers and third parties are continually enhancing and modifying APIs.
B.
APIs can have automated settings.
C.
It is impossible to uninstall APIs.
D.
APIs are a form of malware.
Cloud customers and third parties are continually enhancing and modifying APIs.
A honeypot can be used for all the following purposes except ____________.
Response:
A.
Gathering threat intelligence
B.
Luring attackers
C.
Distracting attackers
D.
Delaying attackers
Luring attackers
Who is the entity identified by personal data?
Response:
A.
The data owner
B.
The data processor
C.
The data custodian
D.
The data subject
The data subject
Egress monitoring solutions usually include a function that ____________.
Response:
A.
Uses biometrics to scan users
B.
Inspects incoming packets
C.
Resides on client machines
D.
Uses stateful inspection
Resides on client machines
Page 10 out of 103 Pages |
Previous |