Which of the following sanitization methods is feasible for use in the cloud?
Answer :
Crypto-shredding
According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at
the same time as) the Create phase?
Answer :
Store
According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes immediately
before the Share phase?
Answer :
Use
What is a form of cloud data protection where data is spread across multiple storage
devices/locations, similar to RAID in the legacy environment?
Answer :
Data dispersion
Which of the following will DLP solutions most likely not inspect?
Answer :
VoIP conversations
Data dispersion is a cloud data security technique that is most similar to which legacy
implementation?
Answer :
Redundant Array of Inexpensive Disks (RAID
Which of the following terms describes a means to centralize logical control of all networked
nodes in the environment, abstracted from the physical connections to each?
Answer :
Software-defined network (SDN)
What is the most prevalent protocol used in identity federation?
Answer :
SAML
The process of identity management includes all the following elements
except ……………………...
Answer :
Redaction
What can be revealed by an audit of a baseline virtual image, used in a cloud environment?
Answer :
Whether necessary security controls are in place and functioning properly