Which of the following are distinguishing characteristics of a managed service provider?
What are the U.S. State Department controls on technology exports known as?
All of these are methods of data discovery, except:
Which of the following best describes the Organizational Normative Framework (ONF)?
The various models generally available for cloud BC/DR activities include all of the following except:
Every security program and process should have which of the following?
Which of the following would be considered an example of insufficient due diligence leading to security or operational problems when moving to a cloud?
Many activities within a cloud environment are performed via programmatic means, where complex and distributed operations are handled without the need to perform each step individually.
Which of the following concepts does this describe?
SOC Type 1 reports are considered "restricted use," in that they are intended only for limited audiences and purposes.
Which of the following is NOT a population that would be appropriate for a SOC Type 1 report?
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
What is a serious complication an organization faces from the perspective of compliance with international operations?
Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?
What is the biggest concern with hosting a key management system outside of the cloud environment?
What type of masking strategy involves making a separate and distinct copy of data with masking in place?
Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?