Topic 2, Exam Pool B
Which of the following methods is often used to obscure data from production systems for use in test or development environments?
Response:
A.
Tokenization
B.
Encryption
C.
Masking
D.
Classification
Masking
Single sign-on systems work by authenticating users from a centralized location or using a
centralized method, and then allowing applications that trust the system to grant those
users access. What would be passed between the authentication system and the
applications to grant a user access?
Response:
A.
Ticket
B.
Certificate
C.
Credential
D.
Token
Token
Why does the physical location of your data backup and/or BCDR failover environment
matter?
Response:
A.
It may affect regulatory compliance
B.
Lack of physical security
C.
Environmental factors such as humidity
D.
It doesn’t matter. Data can be saved anywhere without consequence
It may affect regulatory compliance
Which phase of the cloud data lifecycle also typically entails the process of data
classification?
Response:
A.
Use
B.
Store
C.
Create
D.
Archive
Create
When considering the option to migrate from an on-premises environment to a hosted
cloud service, an organization should weigh the risks of allowing external entities to access
the cloud data for collaborative purposes against ____________.
Response:
A.
Not securing the data in the legacy environment
B.
Disclosing the data publicly
C.
Inviting external personnel into the legacy workspace in order to enhance collaboration
D.
Sending the data outside the legacy environment for collaborative purposes
Sending the data outside the legacy environment for collaborative purposes
Page 33 out of 103 Pages |
Previous |