Topic 1: Exam Pool A
When considering the option to migrate from an on-premises environment to a hosted
cloud service, an organization should weigh the risks of allowing external entities to access the cloud data for collaborative purposes against ____________.
Response:
A.
Not securing the data in the legacy environment
B.
Disclosing the data publicly
C.
Inviting external personnel into the legacy workspace in order to enhance collaboration
D.
Sending the data outside the legacy environment for collaborative purposes
Sending the data outside the legacy environment for collaborative purposes
According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after
(or at the same time as) the Create phase?
A.
Store
B.
Use
C.
Deploy
D.
Archive
Store
All of the following are usually nonfunctional requirements except ____________.
Response:
A.
Color
B.
Sound
C.
Security
D.
Function
Function
The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common
threats to organizations participating in cloud computing.According to the CSA, an organization that suffers a data breach might suffer all of
the following negative effects except __________.
Response:
A.
Cost of compliance with notification laws
B.
Loss of public perception/goodwill
C.
Loss of market share
D.
Cost of detection
Cost of detection
TLS uses ___________ to authenticate a connection and create a shared secret for
the duration of the session.
A.
SAML 2.0
B.
X.509 certificates
C.
802.11X
D.
The Diffie-Hellman process
X.509 certificates
Page 2 out of 103 Pages |
Previous |