Question.51 Which of the following processes involves searching and collecting evidence during an investigation or lawsuit? (A) E-discovery (B) Review analysis (C) Information governance (D) Chain of custody |
51. Click here to View Answer
Answer: A
Question.52 An attack team performed a penetration test on a new smart card system. The team demonstrated that by subjecting the smart card to high temperatures, the secret key could be revealed. Which of the following side-channel attacks did the team use? (A) Differential power analysis (B) Differential fault analysis (C) Differential temperature analysis (D) Differential timing analysis |
52. Click here to View Answer
Answer: C
Question.53 A company wants to protect its intellectual property from theft. The company has already applied ACLs and DACs. Which of the following should the company use to prevent data theft? (A) Watermarking (B) DRM (C) NDA (D) Access logging |
53. Click here to View Answer
Answer: B
Question.54 Which of the following is the MOST important cloud-specific risk from the CSP’s viewpoint? (A) Isolation control failure (B) Management plane breach (C) Insecure data deletion (D) Resource exhaustion |
54. Click here to View Answer
Answer: C
Question.55 Which of the following BEST describes a common use case for homomorphic encryption? (A) Processing data on a server after decrypting in order to prevent unauthorized access in transit (B) Maintaining the confidentiality of data both at rest and in transit to and from a CSP for processing (C) Transmitting confidential data to a CSP for processing on a large number of resources without revealing information (D) Storing proprietary data across multiple nodes in a private cloud to prevent access by unauthenticated users |
55. Click here to View Answer
Answer: C