Why is a service type of network typically isolated on different hardware?
A. It requires distinct access controls
B. It manages resource pools for cloud consumers
C. It has distinct functions from other networks
D. It manages the traffic between other networks
E. It requires unique security
What is true of companies considering a cloud computing business relationship?
A. The laws protecting customer data are based on the cloud provider and customer location only.
B. The con dentiality agreements between companies using cloud computing services is limited legally to the company, not the provider.
C. The companies using the cloud providers are the custodians of the data entrusted to them.
D. The cloud computing companies are absolved of all data security and associated risks through contracts and data laws.
E. The cloud computing companies own all customer data.
Which of the following is NOT normally a method for detecting and preventing data migration into the cloud?
A. Intrusion Prevention System
B. URL filters
C. Data Loss Prevention
D. Cloud Access and Security Brokers (CASB)
E. Database Activity Monitoring
In the Software-as-a-service relationship, who is responsible for the majority of the security?
A. Application Consumer
B. Database Manager
C. Application Developer
D. Cloud Provider
E. Web Application CISO
How can you monitor and filter data in a virtual network when traffic might not cross the physical network?
A. Route traffic to the physical network for capturing
B. Route traffic to a virtual appliance on the same virtual network
C. Route traffic to a virtual network monitoring or filtering tool on the same hardware
D. A and B
E. B and C
What are the encryption options available for SaaS consumers?
A. Provider-managed and (sometimes) proxy encryption
B. Any encryption option that is available for volume storage, object storage, or PaaS
C. Volume storage encryption
D. Client/application and file/folder encryption
E. Object encryption
Which common component of big data is focused on the mechanisms used to ingest large volumes of data, often of a streaming nature?
A. Distributed processing
B. Distributed storage
C. Distributed attribution
D. Distributed data collection
E. Distributed information
Which of the following statements best defines the "authentication" component of identity, entitlement, and access management (IdEA).
A. A guarantee that data in a repository is 100% unregulated
B. Updating security protocols to the latest version
C. Establishing/asserting the identity to the application
D. The process of specifying and maintaining access policies
E. None of the above
Who is responsible for the proper rights management and configuration of exposed controls in the management plane?
A. The cloud provider
B. The responsibility is split equally
C. The cloud consumer
D. It depends on the agreement
E. The majority is covered by the provider