The different cloud service models have varying levels of responsibilities for functions and operations depending with the model's level of service.In which of the following models would the responsibility for patching lie predominantly with the cloud customer?
#391
Answer: D✅ Correct❌ Incorrect
Which component of ITIL involves the creation of an RFC ticket and obtaining official approvals for it?
#392
Answer: D✅ Correct❌ Incorrect
Which of the following are attributes of cloud computing?
#393
Answer: A✅ Correct❌ Incorrect
In a cloud environment, encryption should be used for all the following, except:
#394
Answer: D✅ Correct❌ Incorrect
Which of the following is considered a technological control?
#395
Answer: A✅ Correct❌ Incorrect
When using an IaaS solution, what is the capability provided to the customer?
#396
Answer: A✅ Correct❌ Incorrect
When using an IaaS solution, what is a key benefit provided to the customer?
#397
Answer: D✅ Correct❌ Incorrect
Which of the following is considered an administrative control?
#398
Answer: B✅ Correct❌ Incorrect
What is a key capability or characteristic of PaaS?
#399
Answer: C✅ Correct❌ Incorrect
In which cloud service model is the customer required to maintain the OS?
#400
Answer: A✅ Correct❌ Incorrect
When using a PaaS solution, what is the capability provided to the customer?
#401
Answer: B✅ Correct❌ Incorrect
What are SOC 1/SOC 2/SOC 3?
#402
Answer: A✅ Correct❌ Incorrect
Gathering business requirements can aid the organization in determining all of this information about organizational assets, except:
#403
Answer: D✅ Correct❌ Incorrect
In attempting to provide a layered defense, the security practitioner should convince senior management to include security controls of which type?
#404
Answer: B✅ Correct❌ Incorrect
The BIA can be used to provide information about all the following, except:
#405
Answer: C✅ Correct❌ Incorrect
Which of the following are cloud computing roles?
#406
Answer: A✅ Correct❌ Incorrect
Which of the following are considered to be the building blocks of cloud computing?
#407
Answer: A✅ Correct❌ Incorrect
Which of the following is considered a physical control?
#408
Answer: A✅ Correct❌ Incorrect
What is an experimental technology that is intended to create the possibility of processing encrypted data without having to decrypt it first?
#409
Answer: C✅ Correct❌ Incorrect
Which of the following are distinguishing characteristics of a managed service provider?
#410
Answer: A✅ Correct❌ Incorrect
To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:
#411
Answer: C✅ Correct❌ Incorrect
Tokenization requires two distinct _________________ .
#412
Answer: C✅ Correct❌ Incorrect
DLP can be combined with what other security technology to enhance data controls?
#413
Answer: A✅ Correct❌ Incorrect
What is the intellectual property protection for a confidential recipe for muffins?
#414
Answer: C✅ Correct❌ Incorrect
Every security program and process should have which of the following?
#415
Answer: C✅ Correct❌ Incorrect
DLP solutions can aid in deterring loss due to which of the following?
#416
Answer: A✅ Correct❌ Incorrect
All policies within the organization should include a section that includes all of the following, except:
#417
Answer: A✅ Correct❌ Incorrect
Proper implementation of DLP solutions for successful function requires which of the following?
#418
Answer: C✅ Correct❌ Incorrect
What is the experimental technology that might lead to the possibility of processing encrypted data without having to decrypt it first?
#419
Answer: D✅ Correct❌ Incorrect
Data labels could include all the following, except: