Question.11 Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment? (A) Cryptographic erasure (B) Zeroing (C) Overwriting (D) Deletion |
11. Click here to View Answer
Correct Answer: D
Question.12 Which of the following cloud aspects complicates eDiscovery? (A) Resource pooling (B) On-demand self-service (C) Multitenancy (D) Measured service |
12. Click here to View Answer
Correct Answer: C
With multitenancy, eDiscovery becomes more complicated because the data collection involves extra steps to ensure that only those customers or systems that are within scope are turned over to the requesting authority.
Question.13 What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to? (A) Scripts (B) RDP (C) APIs (D) XML |
13. Click here to View Answer
Correct Answer: C
Question.14 What is a serious complication an organization faces from the perspective of compliance with international operations? (A) Different certifications (B) Multiple jurisdictions (C) Different capabilities (D) Different operational procedures |
14. Click here to View Answer
Correct Answer: B
When operating within a global framework, a security professional runs into a multitude of jurisdictions and requirements, and many times they might be in contention with one other or not clearly applicable. These requirements can include the location of the users and the type of data they enter into systems, the laws governing the organization that owns the application and any regulatory requirements they may have, as well as the appropriate laws and regulations for the jurisdiction housing the IT resources and where the data is actually stored, which might be multiple jurisdictions as well.
Question.15 Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces? (A) PLAN (B) WAN (C) LAN (D) VLAN |
15. Click here to View Answer
Correct Answer: D