Which of the following is the dominant driver behind the regulations to which a system or application must adhere?
Identity and access management (IAM) is a security discipline that ensures which of the following?
Which of the following methods of addressing risk is most associated with insurance?
What does static application security testing (SAST) offer as a tool to the testers that makes it unique compared to other common security testing methodologies?
Limits for resource utilization can be set at different levels within a cloud environment to ensure that no particular entity can consume a level of resources that impacts other cloud customers.
Which of the following is NOT a unit covered by limits?
Which of the following best describes SAML?
Which component of ITIL involves planning for the restoration of services after an unexpected outage or incident?
Which kind of SSAE audit reviews controls dealing with the organization’s controls for assuring the confidentiality, integrity, and availability of data?
The BC/DR kit should include all of the following except:
Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:
During the course of an audit, which of the following would NOT be an input into the control requirements used as part of a gap analysis.
With a federated identity system, what does the identity provider send information to after a successful authentication?
What are the U.S. Commerce Department controls on technology exports known as?
Which of the following is not a risk management framework?
With the rapid emergence of cloud computing, very few regulations were in place that pertained to it specifically, and organizations often had to resort to using a collection of regulations that were not specific to cloud in order to drive audits and policies.
Which standard from the ISO/IEC was designed specifically for cloud computing?
Which data protection strategy would be useful for a situation where the ability to remove sensitive data from a set is needed, but a requirement to retain the ability to map back to the original values is also present?
Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:
Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?
DLP can be combined with what other security technology to enhance data controls?
Most APIs will support a variety of different data formats or structures.
However, the SOAP API will only support which one of the following data formats?
ISO/IEC has established international standards for many aspects of computing and any processes or procedures related to information technology.
Which ISO/IEC standard has been established to provide a framework for handling eDiscovery processes?
Different types of audits are intended for different audiences, such as internal, external, regulatory, and so on.
Which of the following audits are considered "restricted use" versus being for a more broad audience?
The European Union is often considered the world leader in regard to the privacy of personal data and has declared privacy to be a "human right."
In what year did the EU first assert this principle?
Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.
What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?
Which of the following is considered an internal redundancy for a data center?
Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.
Which of the following is NOT something that firewalls are concerned with?
What is a serious complication an organization faces from the compliance perspective with international operations?
Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?
Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?
Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?
Which of the following statements best describes a Type 1 hypervisor?
From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?
When dealing with PII, which category pertains to those requirements that can carry legal sanctions or penalties for failure to adequately safeguard the data and address compliance requirements?
With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?
Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.
Which of the following compromise the two facets of computing?
Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
Data centers have enormous power resources that are distributed and consumed throughout the entire facility.
Which of the following standards pertains to the proper fire safety standards within that scope?
In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?
Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?
Which of the following would be a reason to undertake a BCDR test?
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions?
Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?
Which type of controls are the SOC Type 1 reports specifically focused on?
What is the concept of segregating information or processes, within the same system or application, for security reasons?
Who would be responsible for implementing IPsec to secure communications for an application?
Which process serves to prove the identity and credentials of a user requesting access to an application or data?
Which security concept is focused on the trustworthiness of data?
Which of the cloud cross-cutting aspects relates to the requirements placed on the cloud provider by the cloud customer for minimum performance standards and requirements that must be met?
Which of the following is the MOST important requirement and guidance for testing during an audit?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
What provides the information to an application to make decisions about the authorization level appropriate when granting access?
Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?
What type of data does data rights management (DRM) protect?
Which of the following is NOT something that an HIDS will monitor?
Which approach is typically the most efficient method to use for data discovery?
Which security concept, if implemented correctly, will protect the data on a system, even if a malicious actor gains access to the actual system?
Which of the following storage types is most closely associated with a traditional file system and tree structure?
Which aspect of archiving must be tested regularly for the duration of retention requirements?
Which United States law is focused on data related to health records and privacy?
Which of the following does NOT relate to the hiding of sensitive data from data sets?
Which of the following are the storage types associated with PaaS?
Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?
Which protocol does the REST API depend on?
Which of the following APIs are most commonly used within a cloud environment?
What must be secured on physical hardware to prevent unauthorized access to systems?
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
GAAPs are created and maintained by which organization?
Which of the following is NOT a criterion for data within the scope of eDiscovery?
Which of the following publishes the most commonly used standard for data center design in regard to tiers and topologies?
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
Within an Infrastructure as a Service model, which of the following would NOT be a measured service?
Which of the following would NOT be considered part of resource pooling with an Infrastructure as a Service implementation?
Which United States law is focused on accounting and financial practices of organizations?
Which technology is NOT commonly used for security with data in transit?
Which of the following storage types is most closely associated with a database-type storage implementation?