Topic 2, Exam Pool B
What principle must always been included with an SOC 2 report?
Response:
A.
Confidentiality
B.
Security
C.
Privacy
D.
Processing integrity
Security
The tasks performed by the hypervisor in the virtual environment can most be likened to
the tasks of the ________ in the legacy environment.
Response:
A.
Central processing unit (CPU)
B.
Security team
C.
OS
D.
PGP
Central processing unit (CPU)
You are the IT director for a small contracting firm. Your company is considering migrating
to a cloud production environment.
Which service model would best fit your needs if you wanted an option that reduced the
chance of vendor lock-in but also did not require the highest degree of administration by
your own personnel?
Response:
A.
IaaS
B.
PaaS
C.
SaaS
D.
TanstaafL
PaaS
Which of the following data protection methodologies maintains the ability to connect back
values to the original values?
Response:
A.
Tokenization
B.
Anonymization
C.
Obfuscation
D.
Dynamic mapping
Tokenization
When designing a cloud data center, which of the following aspects is not necessary to
ensure continuity of operations during contingency operations?
Response:
A.
Access to clean water
B.
Broadband data connection
C.
Extended battery backup
D.
Physical access to the data center
Extended battery backup
Page 34 out of 103 Pages |
Previous |