View all detail and faqs for the Managing-Cloud-Security exam
A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?
A network administrator is concerned about the loss of physical control when moving data to the cloud. Which countermeasure should be implemented to avoid this threat?
Which platform component includes containers and storage?
Which action should be taken to preserve forensic evidence for collection?
Which characteristic could affect the audit process for a customer of a cloud service provider?
Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?
An organization is undergoing an ISO 27001 audit that includes a software as a service (SaaS) solution within scope, and the auditor has requested evidence of controls. What evidence should the organization provide the auditor?
An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?
Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?
An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?