Which security concept would business continuity and disaster recovery fall under? A. Confidentiality B. Availability C. Fault tolerance D. Integrity
Correct Answer: B
Explanation:
Explanation: Disaster recovery and business continuity are vital concerns with availability. If data is destroyed or compromised, having regular backup systems in place as well as being able to perform disaster recovery in the event of a major or widespread problem allows operations to continue with an acceptable loss of time and data to management. This also ensures that sensitive data is protected and persisted in the event of the loss or corruption of data systems or physical storage systems.
Which aspect of cloud computing makes it very difficult to perform repeat audits over time to track changes and compliance? A. Virtualization B. Multitenancy C. Resource pooling D. Dynamic optimization
Correct Answer: A
Explanation:
Explanation: Cloud environments will regularly change virtual machines as patching and versions are changed. Unlike a physical environment, there is little continuity from one period of time to another. It is very unlikely that the same virtual machines would be in use during a repeat audit.
Which regulatory system pertains to the protection of healthcare data? A. HIPAA B. HAS C. HITECH D. HFCA
Correct Answer: A
Explanation:
Explanation: The Health Insurance Portability and Accountability Act (HIPAA) sets stringent requirements in the United States for the protection of healthcare records.
Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed? A. Service-level agreements B. Governance C. Regulatory requirements D. Auditability
Correct Answer: B
Explanation:
Explanation: Governance at its core is the idea of assigning jobs, takes, roles, and responsibilities and ensuring they are satisfactory performed.
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle? A. Functionality B. Programming languages C. Software platform D. Security requirements
Correct Answer: D
Explanation:
Explanation: Security requirements should be incorporated into the software development lifecycle (SDLC) from the earliest requirement gathering stage and should be incorporated prior to the requirement analysis phase.
Which crucial aspect of cloud computing can be most threatened by insecure APIs? A. Automation B. Redundancy C. Resource pooling D. Elasticity
Correct Answer: A
Explanation:
Explanation: Cloud environments depend heavily on API calls for management and automation. Any vulnerability with the APIs can cause
significant risk and exposure to all tenants of the cloud environment.
What is the biggest challenge to data discovery in a cloud environment? A. Format B. Ownership C. Location D. Multitenancy
Correct Answer: C
Explanation:
Explanation: With the distributed nature of cloud environments, the foremost challenge for data discovery is awareness of the location of data and keeping track of it during the constant motion of cloud storage systems.
Which of the following would be a reason to undertake a BCDR test? A. Functional change of the application B. Change in staff C. User interface overhaul of the application D. Change in regulations
Correct Answer: A
Explanation:
Explanation: Any time a major functional change of an application occurs, a new BCDR test should be done to ensure the overall strategy and process are still applicable and appropriate.
What concept does the "T" represent in the STRIDE threat model? A. TLS B. Testing C. Tampering with data D. Transport
Correct Answer: C
Explanation:
Explanation Any application that sends data to the user will face the potential that the user could manipulate or alter the data, whether it resides in cookies, GET or POST commands, or headers, or manipulates client-side validations. If the user receives data from the application, it is crucial that the application validate and verify any data that is received back from the user.
Which aspect of cloud computing makes data classification even more vital than in a traditional data center? A. Interoperability B. Virtualization C. Multitenancy D. Portability
Correct Answer: C
Explanation:
Explanation: With multiple tenants within the same hosting environment, any failure to properly classify data may lead to potential exposure to other customers and applications within the same environment.
Please disable your adblocker or whitelist this site!