Which process is implemented during the hardening of an operating system (OS) and its workloads?
Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?
Which description accurately characterizes the movement of applications to the cloud?
Which cloud storage design is based on a hierarchical system?
Which data management activity is considered legal fair use of a copyrighted item?
Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?
An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?
Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
What is the definition of transportable as it relates to cloud contract design requirements?
Which tier from Uptime Institute's Data Center Site Infrastructure Tier Standards is considered to be the most secure, reliable, and redundant in design and operational elements?
Which characteristic could affect the audit process for a customer of a cloud service provider?
A breach caused by lack of security management resulted in a civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight. Who should be contacted?
An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?
An organization wants to conduct some of the disaster recovery plan testing with the least possible impact on production. Which method should be used?
Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?
Which key management option typically needs to be on-premises and delivers the keys to the cloud over a dedicated connection?
A warning system identifies an impending disaster. When should failover occur to ensure continuity of operations?
A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?
Which type of cloud security vulnerability is static application security testing (SAST) likely to find?
What is a benefit of federated identity and access management (IAM)?
Which logical consideration should be addressed when planning the design of a data center?
Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?
Which action should be taken to preserve forensic evidence for collection?
Which activity is within the scope of the cloud provider’s role in the chain of custody?
Which steps should an organization take to avoid risk when dealing with software licensing?
An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?
Which phase of the cloud secure data lifecycle is being viewed and processed without modification?
Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?
Which cloud architecture model provides application development services?
Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?
Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?
Which security risk is co-owned by the enterprise team and the cloud provider in the software as a service (SaaS) model?
Which phase in secure application design and development includes threat modeling?
An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?
Which type of service allows an organization to maximize control of its information?
Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?
Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?
Which country lacks a national law assuring individual personal privacy?
Which cost is reduced by using software as a service (SaaS)?
Which cloud model allows an on-premises data center to use cloud bursting?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?
Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?
What is a risk in using the community cloud over the private cloud?
During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?
Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?
Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?
Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?
Which security threat occurs when authorized users increase their level of access in an unauthorized manner?
Which security strategy is associated with data rights management solutions?
After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?
Which characteristic of cloud computing refers to sharing physical assets among multiple customers?
An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?
Which business continuity and disaster recovery consideration should be part of a cloud application architecture?
As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?
Which countermeasure should be taken during the containment, eradication, and recovery phase of the incident response lifecycle?
Which service model requires the most consumer responsibility for security issues?
A company has determined that encryption has too much overhead to work with their system and has identified tokenization as an alternative. During this process, the tokenization server generates the token. Which step should occur immediately after this action?