Which format is the most commonly used standard for exchanging information within a federated identity system? A. XML B. HTML C. SAML D. JSON
Correct Answer: C
Explanation:
Explanation: Security Assertion Markup Language (SAML) is the most common data format for information exchange within a federated identity system. It is used to transmit and exchange authentication and authorization data.XML is similar to SAML, but it’s used for general-purpose data encoding and labeling and is not used for the exchange of authentication and authorization data in the way that SAML is for federated systems. JSON is used similarly to XML, as a text-based data exchange format that typically uses attribute-value pairings, but it’s not used for authentication and authorization exchange. HTML is used only for encoding web pages for web browsers and is not used for data exchange–and certainly not in a federated system.
Which of the following statements about Type 1 hypervisors is true? A. The hardware vendor and software vendor are different. B. The hardware vendor and software vendor are the same C. The hardware vendor provides an open platform for software vendors. D. The hardware vendor and software vendor should always be different for the sake of security.
Correct Answer: B
Explanation:
Explanation: With a Type 1 hypervisor, the management software and hardware are tightly tied together and provided by the same vendor on a closed platform. This allows for optimal security, performance, and support. The other answers are all incorrect descriptions of a Type 1 hypervisor.
Which type of testing uses the same strategies and toolsets that hackers would use? A. Static B. Malicious C. Penetration D. Dynamic
Correct Answer: C
Explanation:
Explanation: Penetration testing involves using the same strategies and toolsets that hackers would use against a system to discovery potential vulnerabilities. Although the term malicious captures much of the intent of penetration testing from the perspective of an attacker, it is not the best answer. Static and dynamic are two types of system testing–where static is done offline and with knowledge of the system, and dynamic is done on a live system without any previous knowledge is associated–but neither describes the type of testing being asked for in the question.
Security is a critical yet often overlooked consideration for BCDR planning.
At which stage of the planning process should security be involved? A. Scope definition B. Requirements gathering C. Analysis D. Risk assessment
Correct Answer: A
Explanation:
Explanation: Defining the scope of the plan is the very first step in the overall process. Security should be included from the very earliest stages and throughout the entire process. Bringing in security at a later stage can lead to additional costs and time delays to compensate for gaps in planning. Risk assessment, requirements gathering, and analysis are all later steps in the process, and adding in security at any of those points can potentially cause increased costs and time delays.
Key maintenance and security are paramount within a cloud environment due to the widespread use of encryption for both data and transmissions.
Which of the following key-management systems would provide the most robust control over and ownership of the key-management processes for the cloud customer? A. Remote key management service B. Local key management service C. Client key management service D. Internal key management service
Correct Answer: A
Explanation:
Explanation: A remote key management system resides away from the cloud environment and is owned and controlled by the cloud customer. With the use of a remote service, the cloud customer can avoid being locked into a proprietary system from the cloud provider, but also must ensure that service is compatible with the services offered by the cloud provider. A local key management system resides on the actual servers using the keys, which does not provide optimal security or control over them. Both the terms internal key management service and client key management service are provided as distractors.
There are many situations when testing a BCDR plan is appropriate or mandated.
Which of the following would not be a necessary time to test a BCDR plan? A. After software updates B. After regulatory changes C. After major configuration changes D. Annually
Correct Answer: B
Explanation:
Explanation: Regulatory changes by themselves would not trigger a need for new testing of a BCDR plan. Any changes necessary for regulatory compliance would be accomplished through configuration changes or software updates, which in turn would then trigger the necessary new testing. Annual testing is crucial to any BCDR plan. Also, any time major configuration changes or software updates are done, the plan should be evaluated and tested to ensure it is still valid and complete.
When data discovery is undertaken, three main approaches or strategies are commonly used to determine what the type of data, its format, and composition are for the purposes of classification.
Which of the following is NOT one of the three main approaches to data discovery? A. Content analysis B. Hashing C. Labels D. Metadata
Correct Answer: B
Explanation:
Explanation: Hashing involves taking a block of data and, through the use of a one-way operation, producing a fixed-size value that can be used for comparison with other data. It is used primarily for protecting data and allowing for rapid comparison when matching data values such as passwords. Labels involve looking for header information or other categorizations of data to determine its type and possible classifications. Metadata involves looking at information attributes of the data, such as creator, application, type, and so on, in determining classification. Content analysis involves examining the actual data itself for its composition and classification level.
Which protocol operates at the network layer and provides for full point-to-point encryption of all communications and transmissions? A. IPSec B. VPN C. SSL D. TLS
Correct Answer: A
Explanation:
Explanation: IPSec is a protocol for encrypting and authenticating packets during transmission between two parties and can involve any type of device, application, or service. The protocol performs both the authentication and negotiation of security policies between the two parties at the start of the connection and then maintains these policies throughout the lifetime of the connection. TLS operates at the application layer, not the network layer, and is widely used to secure communications between two parties. SSL is similar to TLS but has been deprecated. Although a VPN allows a secure channel for communications into a private network from an outside location, it’s not a protocol.
The GAPP framework was developed through a joint effort between the major Canadian and American professional accounting associations in order to assist their members with managing and preventing risks to the privacy of their data and customers.
Which of the following is the meaning of GAPP? A. General accounting personal privacy B. Generally accepted privacy practices C. Generally accepted privacy principles D. General accounting privacy policies
During the course of an audit, which of the following would NOT be an input into the control requirements used as part of a gap analysis. A. Contractual requirements B. Regulations C. Vendor recommendations D. Corporate policy
Correct Answer: C
Explanation:
Explanation: Vendor recommendations would not be pertinent to the gap analysis after an audit. Although vendor recommendations will typically play a role in the development of corporate policies or contractual requirements, they are not required. Regulations, corporate policy, and contractual requirements all determine the expected or mandated controls in place on a system.
Please disable your adblocker or whitelist this site!