<< Prev Question Next Question >>

Question 46/105

Under the new EU data protection rules. data destruction and corruption of personal data.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (105q)
Question 1: Which of the following is NOT part of Risk management proces...
Question 2: Enterprise Risk Management is part of over all information R...
Question 3: Which attack surfaces, if any, does virtualization technolog...
Question 4: Which of the following establishes commonly accepted control...
1 commentQuestion 5: The basis for deciding which laws are most appropriate in a ...
Question 6: In which service model, cloud consumer is responsible to man...
2 commentQuestion 7: CCM: A hypothetical company called: "Health4Sure" is located...
Question 8: Which of the following allows organizations to access, repor...
Question 9: As we move from Software as a Service Model towards Infrastr...
Question 10: "Cloud provider acquisition" as a risk fall under which of t...
Question 11: Your cloud and on-premises infrastructures should always use...
Question 12: One of the purpose of incident response is to minimize the a...
Question 13: Which of the following is an assurance program and documenta...
Question 14: John said that he is looking for cloud service which is self...
Question 15: Which of the standards is related to risk management?...
1 commentQuestion 16: Identifying the specific threats against servers and determi...
2 commentQuestion 17: Which is the primary tool for governance in Cloud Computing ...
Question 18: In which cloud service model is the customer only responsibl...
Question 19: The key focus of any business continuity or disaster recover...
Question 20: Which of the following processes plays a major role in manag...
Question 21: Which of the following is correct about Due Care &amp; Due D...
Question 22: IT Risk management is best described in:...
2 commentQuestion 23: Who is responsible for Application Security in Software as a...
Question 24: What is it called when you lose control of the amount of con...
Question 25: A unit of processing, which can be in a virtual machine, a c...
Question 26: Cloud Security provider is responsible for Platform Security...
Question 27: What refers refer the model that allows customers to scale t...
Question 28: Why is a service type of network typically isolated on diffe...
Question 29: Which of the authentication is more secured?...
Question 30: Which of the following Standards define "Application Securit...
Question 31: Which of the following authentication is most secured?...
Question 32: An important consideration when performing a remote vulnerab...
Question 33: Which one of the following is the key tool of Cloud Governan...
Question 34: Which of the following uses security and encryption as means...
Question 35: Which of the following reports is of most interest to the cu...
Question 36: Operating System management is done by customer in which ser...
Question 37: Which of the following is the key difference between cloud c...
Question 38: Which layer is the most important for securing because it is...
Question 39: Which of the following can result in vendor lock-in?...
Question 40: Which of the following decouples the network control plane f...
Question 41: NIST defines five characteristics of cloud computing- Rapid ...
Question 42: A SIEM device should be tuned in regularly to:...
Question 43: Credentials and cryptographic keys must not be embedded in s...
Question 44: What is known as a code execution environment running within...
Question 45: GRC is responsibility of ______ in the all cloud services mo...
Question 46: Under the new EU data protection rules. data destruction and...
Question 47: Which of the following functions maps to all the phases of D...
Question 48: Which one of the following is NOT one of phases for cloud au...
Question 49: REST APIs are the standard for web-based services because th...
Question 50: Which of the following processes leverages virtual network t...
Question 51: The risk left in any system after all countermeasures and st...
Question 52: Cloud customer can do vulnerability assessment of their whol...
Question 53: CCM: In the CCM tool, "Encryption and Key Management" is an ...
Question 54: One of the main reasons and advantage of having external aud...
Question 55: As with security. compliance in the cloud is a shared respon...
Question 56: The intermediary that provides connectivity and transport of...
Question 57: ENISA: Lock-in is ranked as a high risk in ENISA research, a...
Question 58: What is the newer application development methodology and ph...
Question 59: Which provides guidelines for organizational information sec...
Question 60: What is the key difference between Business Continuity and B...
1 commentQuestion 61: Which standard offers guidelines for information security co...
Question 62: Which one of the following is the key techniques to create c...
Question 63: Network logs from cloud providers are typically flow records...
Question 64: One of the part of STRIDE model is:...
Question 65: The entity that has the primary relationship with an individ...
Question 66: Use elastic servers when possible and move workloads to new ...
Question 67: Which of the following items is NOT an example of Security a...
Question 68: Which of the following Storage type is NOT associated with S...
Question 69: Cloud services exhibit five essential characteristics that d...
Question 70: What item below allows disparate directory services and inde...
Question 71: Lack of CPU or network bandwidth and intermittent access to ...
Question 72: Which of the following leverages virtual network topologies ...
Question 73: CCM: The following list of controls belong to which domain o...
Question 74: Which of the following is NOT atypical approach of Key Stora...
Question 75: Which is the most common control used for Risk Transfer?...
Question 76: What is the process to determine any weaknesses in the appli...
Question 77: Which of the following Standards is normally followed to man...
Question 78: Who is responsible for the safe custody, transport, data sto...
Question 79: Which of the cloud service model has least maintenance or ad...
Question 80: ISO 27001 certification can be taken as proof to achieve Thi...
Question 81: Which is the set of technologies that are designed to detect...
Question 82: Code execution environments that run within an operating sys...
Question 83: One of the primary benefits of the cloud is the ability to p...
Question 84: Which of the following best describes the relationship betwe...
Question 85: Stopping a function to control further risk to business is c...
Question 86: Which of the following is also knows as white-box test and c...
Question 87: ln which of the following cloud service models is the custom...
Question 88: Dynamic Application Security Testing (DAST) might be limited...
Question 89: In cloud services. risks and responsibilities are shared bet...
Question 90: When deploying Security as a Service in a highly regulated i...
Question 91: What is the characteristic that allows the cloud provider to...
Question 92: Which of the following is NOT a characteristic of cloud comp...
Question 93: All of the following are type of access controls except:...
Question 94: Which term is used to describe the use of tools to selective...
Question 95: Which of the following is a form of compliance inheritance a...
Question 96: The characteristics and traits of an individual that when ag...
Question 97: The ability of a cloud services datacentre and its associate...
Question 98: Which of the following is NOT a component of Software Define...
Question 99: In the IaaS hosted environment. who is ultimately responsibl...
Question 100: Which one of the following is NOT a level of CSA star progra...
Question 101: One of key focus of ISO 27001 standard is:...
Question 102: Which of the following is not an abuse or misuse of cloud se...
Question 103: According to Cloud Security Alliance logical model of cloud ...
Question 104: Which communication methods within a cloud environment must ...
Question 105: Which of the following is NOT true about CSA Cloud control m...