Topic 1: Exam Pool A
At which phase of the SDLC process should security begin participating?
A.
Requirements gathering
B.
Requirements analysis
C.
Design
D.
Testing
Requirements gathering
The final phase of the cloud data lifecycle is the destroy phase, where data is
ultimately deleted and done so in a secure manner to ensure it cannot be recovered
or reconstructed. Which cloud service category poses the most challenges to data
destruction or the cloud customer?
A.
Platform
B.
Software
C.
Infrastructure
D.
Desktop
Software
In the cloud motif, the data processor is usually:
Response:
A.
The party that assigns access rights
B.
The cloud customer
C.
The cloud provider
D.
The cloud access security broker
The cloud provider
Which of the following is the best and only completely secure method of data destruction?
Response:
A.
Degaussing
B.
Crypto-shredding
C.
Physical destruction of resources that store the data
D.
Legal order issued by the prevailing jurisdiction where the data is geographically
situated
Physical destruction of resources that store the data
Which of the following is a risk in the cloud environment that is not existing or is as
prevalent in the legacy environment?
Response:
A.
Legal liability in multiple jurisdictions
B.
Loss of productivity due to DDoS
C.
Ability of users to gain access to their physical workplace
D.
Fire
Legal liability in multiple jurisdictions
Page 16 out of 103 Pages |
Previous |