View all detail and faqs for the Managing-Cloud-Security exam
Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?
A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?
Which security testing method requires compliance with the cloud service provider’s terms of service?
Which cloud computing service model allows customers to run their own application code without configuring the server environment?
Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?
An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?
An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?
Which data retention policy addresses how long data must be retained to meet regulatory requirements?
Which strategy will reduce the impact of risk in the business continuity and disaster recovery planning process?
Which technology prevents the environment from being over-controlled with performance-degrading security measures for applications?