Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
A. Platform-as-a-service (PaaS)
B. Desktop-as-a-service (DaaS)
C. Infrastructure-as-a-service (IaaS)
D. Identity-as-a-service (IDaaS)
E. Software-as-a-service (SaaS)
Which governance domain deals with evaluating how cloud computing affects compliance with internal security policies and various legal requirements, such as regulatory and legislative?
A. Legal Issues: Contracts and Electronic Discovery
B. Infrastructure Security
C. Compliance and Audit Management
D. Information Governance
E. Governance and Enterprise Risk Management
Which concept provides the abstraction needed for resource pools?
A. Virtualization
B. Applistructure
C. Hypervisor
D. Metastructure
E. Orchestration
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
A. Database encryption
B. Media encryption
C. Asymmetric encryption
D. Object encryption
E. Client/application encryption
What are the barriers to developing full confidence in security as a service (SecaaS)?
A. Federation bridges, software compatibility, and implementation
B. Delegations, bipartisan tenancy, and implementation
C. Single tenancy and vendor lock-in
D. Provisioning, federation, and compliance
E. Compliance, multi-tenancy, and vendor lock-in
Which component is a key part of software container systems?
A. Operating system
B. Workload tools
C. An automated controller.
D. The execution environment
E. A client
What are the NIST defined essential characteristics of cloud computing?
A. Rapid elasticity, compliance readiness, and resource pooling
B. Broad network access, measured service, multifactor configurability, and resource pooling
C. Broad network access, automatic patching, compliance readiness, and resource pooling
D. Broad network access, rapid elasticity, measured service, on-demand self-service, and resource pooling
E. Broad network access, rapid elasticity, automatic patching, and resource pooling
To increase network isolation, you should use SDN capabilities for multiple networks and cloud accounts or segments.
A. False
B. True
What are six phases of the Data Security Lifecycle?
A. Create, Store, Use, Share, Archive, Destroy
B. Create, Classify, Use, Store, Archive, Destroy
C. Assign, Define, Create, Process, Store, Destroy
D. Create, Classify, Use, Store, Retain, Destroy
E. Assign, Define, Store, Process, Transmit, Destroy
The NIST defines cloud computing in part by describing five essential characteristics which are: broad network access, rapid elasticity, resource pooling, measured service and which of the following?
A. On-demand self-service access for users
B. standardized auditing for all customers
C. separate hardware for all cloud customers
D. publicly shared resources for all customers
E. multi-tenancy for all users