Which term relates to the application of scientific methods and practices to evidence?
A. Forensics
B. Methodical
C. Theoretical
D. Measured
Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?
A. SAS-70
B. SOC 2
C. SOC 1
D. SOX
If you're using iSCSI in a cloud environment, what must come from an external protocol or application?
A. Kerberos support
B. CHAP support
C. Authentication
D. Encryption
Which approach is typically the most efficient method to use for data discovery?
A. Metadata
B. Content analysis
C. Labels
D. ACLs
With IaaS, what is responsible for handling the security and control over the volume storage space?
A. Management plane
B. Operating system
C. Application
D. Hypervisor
An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer.
Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?
A. Network
B. Users
C. Memory
D. CPU
What category of PII data can carry potential fines or even criminal charges for its improper use or disclosure?
A. Protected
B. Legal
C. Regulated
D. Contractual
To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:
A. Multifactor authentication
B. DLP agents
C. Two-person integrity
D. Local encryption
Hardening the operating system refers to all of the following except:
A. Limiting administrator access
B. Closing unused ports
C. Removing antimalware agents
D. Removing unnecessary services and libraries
In addition to whatever audit results the provider shares with the customer, what other mechanism does the customer have to ensure trust in the provider's performance and duties?
A. HIPAA
B. The contract
C. Statutes
D. Security control matrix