<< Prev Question Next Question >>

Question 43/103

Metrics which govern the contractual obligations of cloud service are found in:

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (103q)
Question 1: The intermediary that provides connectivity and transport of...
Question 2: ENISA: A reason for risk concerns of a cloud provider being ...
Question 3: Which of the following is not one of the essential character...
Question 4: Which of the following reports the cloud service provide nor...
Question 5: Which of the following adds abstraction layer on top of netw...
Question 6: Which are the two major categories of network virtualization...
Question 7: CCM: In the CCM tool, a _____________________ is a measure t...
Question 8: Which of the following phases of data security lifecycle typ...
Question 9: What is the main driver for decision to deploy cloud solutio...
Question 10: A health care facility has to only comply with HIPAA and do ...
Question 11: When creating business strategies for cloud migration. which...
Question 12: Which statement best describes why it is important to know h...
Question 13: Enterprise Risk Management is part of over all information R...
Question 14: Which of the following are communications method for compone...
Question 15: Private cloud model can be managed by third party who may no...
Question 16: ln which of the following cloud service models is the custom...
Question 17: Which of the following establishes commonly accepted control...
Question 18: Which is the key mechanism used by organisations that suppor...
Question 19: What is resource pooling?
Question 20: Which of the following will not be provided by cloud service...
Question 21: Which of the following allows organizations to access, repor...
Question 22: Which of the following is an effective way of segregating di...
Question 23: Exploitable bugs in programs that attackers can use to infil...
Question 24: In a cloud scenario. who is the data processor and who is th...
Question 25: ENISA: "VM hopping" is:
Question 26: Network logs from cloud providers are typically flow records...
Question 27: Due to multi-tenancy nature of cloud. there is the possibili...
Question 28: Your cloud and on-premises infrastructures should always use...
Question 29: Cloud customer can do vulnerability assessment of their whol...
Question 30: What is the best way to ensure that all data has been remove...
Question 31: ln which service model. does cloud security provider has lea...
Question 32: What is the key difference between Business Continuity and B...
Question 33: Which of the following is the correct pair of risk managemen...
Question 34: In which cloud service model is the customer only responsibl...
Question 35: Cloud customer and cloud service provider are jointly respon...
Question 36: Stopping a function to control further risk to business is c...
Question 37: When the data is transferred to third party. who is ultimate...
Question 38: Which is the most important trust mechanism between cloud se...
Question 39: Which of the following is NOT atypical approach of Key Stora...
Question 40: Which of the following is key benefit of private cloud model...
Question 41: What is the process to determine any weaknesses in the appli...
Question 42: Which of the following can lead to vendor lock-in?...
Question 43: Metrics which govern the contractual obligations of cloud se...
Question 44: An adversary uses a cloud Platform to launch a DDoS attack a...
Question 45: How does virtualized storage help avoid data loss if a drive...
Question 46: Which of the following is most commonly used to program Appl...
Question 47: Who is responsible for infrastructure Security in Software a...
Question 48: What is true of security as it relates to cloud network infr...
1 commentQuestion 49: Which of the following describes the cloud security referenc...
Question 50: Which term is used to describe the use of tools to selective...
Question 51: In ability to provide enough capacity to the cloud customer ...
Question 52: John said that he is looking for cloud service which is self...
Question 53: Operating System management is done by customer in which ser...
Question 54: ______ refers to the deeper integration of development and o...
Question 55: What refers refer the model that allows customers to scale t...
Question 56: How can virtual machine communications bypass network securi...
Question 57: Which data security control is the LEAST likely to be assign...
Question 58: CCM: In the CCM tool, a is a measure that modifies risk and ...
Question 59: Which of the following are key Data functions?...
Question 60: Which document defines the minimum levels of service availab...
Question 61: Which of the following Standards is normally followed to man...
Question 62: A cloud storage architecture that caches content close to lo...
Question 63: Which of the vulnerabilities is inherited from general softw...
Question 64: Which of the following are two most effective ways of protec...
Question 65: An adversary stole1 million username and passwords of Pass4t...
Question 66: Who is responsible for Data Security in Software as a Servic...
Question 67: What is the key benefit provided to the customer in Infrastr...
Question 68: Which of the following Standards define "Application Securit...
Question 69: What item below allows disparate directory services and inde...
Question 70: Exploitable bugs in programs that attackers can use to infil...
Question 71: Which one of the following is NOT a level of CSA star progra...
Question 72: CCM: The following list of controls belong to which domain o...
Question 73: An important consideration when performing a remote vulnerab...
Question 74: Which one of the following is NOT one of phases for cloud au...
Question 75: What factors should you understand about the data specifical...
Question 76: Which of the followinglS0 Standard provides Code of practice...
Question 77: One of the primary benefits of the cloud is the ability to p...
Question 78: Which communication methods within a cloud environment must ...
Question 79: Which concept provides the abstraction needed for resource p...
Question 80: Which cloud-based service model enables companies to provide...
Question 81: An inherent weakness in an information system. security proc...
Question 82: Credentials and cryptographic keys must not be embedded in s...
Question 83: Cloud applications can use virtual networks and other struct...
Question 84: According to ENISA(European Network and Information Security...
Question 85: Which of the following best describes the relationship betwe...
Question 86: What is the newer application development methodology and ph...
Question 87: Which of the following is a perceived advantage or disadvant...
Question 88: Which of the following reports is of most interest to the cu...
Question 89: Which of the following is a key tool for enabling and enforc...
Question 90: Erin has a picture which he wants to store in the cloud and ...
Question 91: Which of the following help to intermediate IAM between an o...
Question 92: Sending data to a provider's storage over an API is likely a...
Question 93: "Cloud provider acquisition" as a risk fall under which of t...
Question 94: In Platform as a Service (PaaS), platform security is a resp...
Question 95: Logs, documentation, and other materials needed for audits a...
Question 96: Which is the key technology that enables the sharing of reso...
Question 97: Which of the following is NOT one of the common networks und...
Question 98: In which type of environment is it impractical to allow the ...
1 commentQuestion 99: Which of the following is also knows as white-box test and c...
Question 100: Ensuring the use of data and information complies with organ...
Question 101: Which is the set of technologies that are designed to detect...
Question 102: Which of the following is NOT a component of Software Define...
Question 103: Which of the following processes leverages virtual network t...