Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.
What type of attack is this?
Where is a DLP solution generally installed when utilized for monitoring data in use?
Which of the following aspects of security is solely the responsibility of the cloud provider?
Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.
Which of the following is NOT a regulatory system from the United States federal government?
If you are running an application that has strict legal requirements that the data cannot reside on systems that contain other applications or systems, which aspect of cloud computing would be prohibitive in this case?
The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/contractors.
What technology would be useful for protecting data at this point?
Three central concepts define what type of data and information an organization is responsible for pertaining to eDiscovery.
Which of the following are the three components that comprise required disclosure?
Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed--and to a certain extent, through what means.
Which of the following is NOT something that firewalls are concerned with?
Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.
Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?
Within a federated identity system, which entity accepts tokens from the identity provider?
Different types of audits are intended for different audiences, such as internal, external, regulatory, and so on.
Which of the following audits are considered "restricted use" versus being for a more broad audience?
With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.
What is the term associated with this determination?
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.
Which role would you be assuming under this directive?
If you're using iSCSI in a cloud environment, what must come from an external protocol or application?
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
Which of the following is NOT a criterion for data within the scope of eDiscovery?
Which of the following roles involves overseeing billing, purchasing, and requesting audit reports for an organization within a cloud environment?
What type of PII is controlled based on laws and carries legal penalties for noncompliance with requirements?
Which of the following standards primarily pertains to cabling designs and setups in a data center?
From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?
Which of the following roles is responsible for peering with other cloud services and providers?
Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?
Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?
Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?
Unlike SOC Type 1 reports, which are based on a specific point in time, SOC Type 2 reports are done over a period of time. What is the minimum span of time for a SOC Type 2 report?
What strategy involves replacing sensitive data with opaque values, usually with a means of mapping it back to the original value?
Which of the following can be useful for protecting cloud customers from a denial-of-service (DoS) attack against another customer hosted in the same cloud?
Which of the following service capabilities gives the cloud customer the least amount of control over configurations and deployments?
What type of host is exposed to the public Internet for a specific reason and hardened to perform only that function for authorized users?
Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?
What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed?
Which of the following is the MOST important requirement and guidance for testing during an audit?
Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?
Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?
Which of the following is NOT a function performed by the record protocol of TLS?
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
Which of the following service categories entails the least amount of support needed on the part of the cloud customer?
Which of the following is NOT an application or utility to apply and enforce baselines on a system?
Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?
Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?
Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?
Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user's client to execute commands on the application under the user's own credentials?
Which phase of the cloud data lifecycle would be the MOST appropriate for the use of DLP technologies to protect the data?
What is a serious complication an organization faces from the perspective of compliance with international operations?
Which of the following is NOT a regulatory system from the United States federal government?
What strategy involves hiding data in a data set to prevent someone from identifying specific individuals based on other data fields present?
Which value refers to the amount of data an organization would need to recover in the event of a BCDR situation in order to reach an acceptable level of operations?
Which of the following is NOT a key area for performance monitoring as far as an SLA is concerned?
Which of the following concepts is NOT one of the core components to an encryption system architecture?
Data masking can be used to provide all of the following functionality, except:
What is the cloud service model in which the customer is responsible for administration of the OS?
Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:
What category of PII data can carry potential fines or even criminal charges for its improper use or disclosure?
Which ITIL component focuses on ensuring that system resources, processes, and personnel are properly allocated to meet SLA requirements?
The cloud customer’s trust in the cloud provider can be enhanced by all of the following except:
A comprehensive BCDR plan will encapsulate many or most of the traditional concerns of operating a system in any data center.
However, what is one consideration that is often overlooked with the formulation of a BCDR plan?
All of the following are techniques to enhance the portability of cloud data, in order to minimize the potential of vendor lock-in except:
Which of the following types of data would fall under data rights management (DRM) rather than information rights management (IRM)?
Which of the following jurisdictions lacks a comprehensive national policy on data privacy and the protection of personally identifiable information (PII)?
Which format is the most commonly used standard for exchanging information within a federated identity system?