Which of the following is considered an external redundancy for a data center?
What controls the formatting and security settings of a volume storage system within a cloud environment?
What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function?
Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?
What must be secured on physical hardware to prevent unauthorized access to systems?
Which of the following roles involves the connection and integration of existing systems and services to a cloud environment?
Which of the following would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?
Which of the following are the storage types associated with PaaS?
Which of the following standards primarily pertains to cabling designs and setups in a data center?
Which United States law is focused on accounting and financial practices of organizations?
Which of the following storage types is most closely associated with a traditional file system and tree structure?
Which of the following pertains to fire safety standards within a data center, specifically with their enormous electrical consumption?
Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?