Which of the cloud cross-cutting aspects relates to the oversight of processes and systems, as well as to ensuring their compliance with specific policies and regulations? A. Governance B. Regulatory requirements C. Service-level agreements D. Auditability
Correct Answer: D
Explanation:
Explanation: Auditing involves reports and evidence that show user activity, compliance with controls and regulations, the systems and processes that run and what they do, as well as information and data access and modification records. A cloud environment adds additional complexity to traditional audits because the cloud customer will not have the same level of access to systems and data as they would in a traditional data center.
Which of the following would NOT be a reason to activate a BCDR strategy? A. Staffing loss B. Terrorism attack C. Utility disruptions D. Natural disaster
Correct Answer: A
Explanation:
Explanation: The loss of staffing would not be a reason to declare a BCDR situation because it does not impact production operations or equipment, and the same staff would be needed for a BCDR situation.
Which of the following service categories entails the least amount of support needed on the part of the cloud customer? A. SaaS B. IaaS C. DaaS D. PaaS
Correct Answer: A
Explanation:
Explanation: With SaaS providing a fully functioning application that is managed and maintained by the cloud provider, cloud customers incur the least amount of support responsibilities themselves of any service category.
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used? A. Platform B. Infrastructure C. Governance D. Application
Correct Answer: C
Explanation:
Explanation: Regardless of which cloud-hosting model is used, the cloud customer always has sole responsibility for the governance of systems and data.
How many additional DNS queries are needed when DNSSEC integrity checks are added? A. Three B. Zero C. One D. Two
Correct Answer: B
Explanation:
Explanation: DNSSEC does not require any additional DNS queries to be performed. The DNSSEC integrity checks and validations are all performed as part of the single DNS lookup resolution.
The SOC Type 2 reports are divided into five principles.
Which of the five principles must also be included when auditing any of the other four principles? A. Confidentiality B. Privacy C. Security D. Availability
Correct Answer: C
Explanation:
Explanation: Under the SOC guidelines, when any of the four principles other than security are being audited, which includes availability, confidentiality, processing integrity, and privacy, the security principle must also be included with the audit.
What concept does the "R" represent with the DREAD model? A. Reproducibility B. Repudiation C. Risk D. Residual
Correct Answer: A
Explanation:
Explanation: Reproducibility is the measure of how easy it is to reproduce and successful use an exploit. Scoring within the DREAD model ranges from 0, signifying a nearly impossibly exploit, up to 10, which signifies something that anyone from a simple function call could exploit, such as a URL.
Which of the following is NOT a function performed by the record protocol of TLS? A. Encryption B. Acceleration C. Authentication D. Compression
Correct Answer: B
Explanation:
Explanation: The record protocol of TLS performs the authentication and encryption of data packets, and in some cases compression as well. It does not perform any acceleration functions.
Which of the cloud cross-cutting aspects relates to the ability for a cloud customer to easily remove their applications and data from a cloud environment? A. Reversibility B. Availability C. Portability D. Interoperability
Correct Answer: A
Explanation:
Explanation: Reversibility is the ability for a cloud customer to easily remove their applications or data from a cloud environment, as well as to ensure that all traces of their applications or data have been securely removed per a predefined agreement with the cloud provider.
Which of the following is NOT an application or utility to apply and enforce baselines on a system? A. Chef B. GitHub C. Puppet D. Active Directory
Correct Answer: B
Explanation:
Explanation: GitHub is an application for code collaboration, including versioning and branching of code trees. It is not used for applying or maintaining system configurations.
Please disable your adblocker or whitelist this site!