View all detail and faqs for the Managing-Cloud-Security exam
An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?
Which data source provides auditability and traceability for event investigation as well as documentation?
Which cloud risk is associated with the supply chain due to dependency on legacy internal servers for application delivery to end users?
Which level of compliance is required by a cloud service provider to protect customer data at banks and insurance companies?
Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?
Which phase of the cloud secure data lifecycle is being viewed and processed without modification?
Which design component contains both a remotely accessible application programming interface (API) and a web graphical user interface?
As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?
Which privacy issue does the Clarifying Lawful Overseas Use of Data (CLOUD) Act address?
Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?