An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?
An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?
Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?
Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
A breach caused by lack of security management resulted in a civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight. Who should be contacted?
Which general body of law covers data breach violations in a cloud environment at a federal agency?
Which level of compliance is required by a cloud service provider to protect customer data at banks and insurance companies?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?
Which cloud computing role can subscribe to a software as a service (SaaS) application?
Which design component contains both a remotely accessible application programming interface (API) and a web graphical user interface?
Which type of service allows an organization to maximize control of its information?
Which key management option typically needs to be on-premises and delivers the keys to the cloud over a dedicated connection?
Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?
An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?
Which characteristic could affect the audit process for a customer of a cloud service provider?
A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
Which risk relates to the removal of a person’s information within the public cloud by legal authorities?
After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?
Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?
Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?
During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?
Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?
What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?
Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?
Which security testing method requires compliance with the cloud service provider’s terms of service?
Which phase of the cloud secure data lifecycle is being viewed and processed without modification?
An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?
Which countermeasure should be taken during the preparation phase of the incident response lifecycle?
Which security issue can be found only through dynamic application security testing (DAST)?
Which technology prevents the environment from being over-controlled with performance-degrading security measures for applications?
Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?
An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?
An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?
Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?
What is the definition of transportable as it relates to cloud contract design requirements?
A company has determined that encryption has too much overhead to work with their system and has identified tokenization as an alternative. During this process, the tokenization server generates the token. Which step should occur immediately after this action?
Why must the software agent management plane of the workload security control support auto-scaling and elasticity?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?
Which guide remedies the challenge of the international nature of cloud forensics and is known for becoming the premier standard for eDiscovery?
A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?
Which type of disaster recovery plan (DRP) test requires the whole organization to participate in a scheduled disaster scenario without performing all of the actual tasks?
Which type of cloud security vulnerability is static application security testing (SAST) likely to find?
Which key cloud computing technology meters what is provided and ensures consumers only use what is allotted?
Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?
The designers of a proposed data center are evaluating the requirements to use virtualization for the services it provides. Which type of design consideration is being addressed?
Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?
Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?
An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?
Which steps should an organization take to avoid risk when dealing with software licensing?