Topic 1: Exam Pool A
Which of the following is not one of the defined security controls domains within the Cloud
Controls Matrix, published by the Cloud Security Alliance?
Response:
A.
Financial
B.
Human resources
C.
Mobile security
D.
Identity and access management
Financial
Which document will enforce uptime and availability requirements between the cloud
customer and cloud provider?
Response:
A.
Contract
B.
Operational level agreement
C.
Service level agreement
D.
Regulation
Service level agreement
You are the security manager of a small firm that has just purchased a DLP solution to
implement in your cloud-based production environment.
In order to increase the security value of the DLP, you should consider combining it with
____________.
Response:
A.
Digital rights management (DRM) and security event and incident management (SIEM)
tools
B.
An investment in upgraded project management software
C.
Digital insurance policies
D.
The Uptime Institute’s Tier certification
Digital rights management (DRM) and security event and incident management (SIEM)
tools
The Transport Layer Security (TLS) protocol creates a secure communications channel
over public media (such as the Internet). In a typical TLS session, who initiates the
protocol?
Response:
A.
The server
B.
The client
C.
The certifying authority
D.
The ISP
The client
Which phase of the cloud data lifecycle involves processing by a user or application?
Response:
A.
Create
B.
Share
C.
Store
D.
Use
Use
Page 19 out of 103 Pages |
Previous |