Topic 2, Exam Pool B
Which of the following characteristics is associated with digital rights management (DRM)
solutions (sometimes referred to as information rights management, or IRM)?
Response:
A.
Mapping to existing access control lists (ACLs)
B.
Delineating biometric catalogs
C.
Preventing multifactor authentication
D.
Prohibiting unauthorized transposition
Mapping to existing access control lists (ACLs)
All of the following might be used as data discovery characteristics in a content-analysisbased
data discovery effort except ____________.
Response:
A.
Keywords
B.
Pattern-matching
C.
Frequency
D.
Inheritance
Inheritance
Which of the following is a possible negative aspect of bit-splitting?
Response:
A.
It may require trust in additional third parties beyond the primary cloud service provider.
B.
There may be cause for management concern that the technology will violate internal
policy.
C.
Users will have far greater difficulty understanding the implementation.
D.
Limited vendors make acquisition and support challenging.
It may require trust in additional third parties beyond the primary cloud service provider.
Which kind of SSAE audit report is a cloud customer most likely to receive from a cloud
provider?
Response:
A.
SOC 1 Type 1
B.
SOC 2 Type 2
C.
SOC 1 Type 2
D.
SOC 3
SOC 3
Which of the following is the best example of a key component of regulated PII?
Response:
A.
Items that should be implemented
B.
Mandatory breach reporting
C.
Audit rights of subcontractors
D.
PCI DSS
Mandatory breach reporting
Page 32 out of 103 Pages |
Previous |