Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.
What term pertains to the application of scientific norms and protocols to digital investigations?
You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?
If a key feature of cloud computing that your organization desires is the ability to scale and expand without limit or concern about available resources, which cloud deployment model would you MOST likely be considering?
With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.
What is the term associated with this determination?
With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?
Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?
Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.
What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?
Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?
With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?
In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?
Most APIs will support a variety of different data formats or structures.
However, the SOAP API will only support which one of the following data formats?
When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.
What is the data encapsulation used with the SOAP protocol referred to as?
Modern web service systems are designed for high availability and resiliency. Which concept pertains to the ability to detect problems within a system, environment, or application and programmatically invoke redundant systems or processes for mitigation?
Which aspect of SaaS will alleviate much of the time and energy organizations spend on compliance (specifically baselines)?
From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?
The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it's used with the hypervisors.
What does the management plane typically leverage for this orchestration?
Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.
Which concept encapsulates this?
Within a federated identity system, which entity accepts tokens from the identity provider?
Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.
Which of the following is NOT a regulatory system from the United States federal government?
What type of masking strategy involves making a separate and distinct copy of data with masking in place?
What is used for local, physical access to hardware within a data center?
What is a serious complication an organization faces from the perspective of compliance with international operations?
What expectation of data custodians is made much more challenging by a cloud implementation, especially with PaaS or SaaS?
Which of the following roles involves testing, monitoring, and securing cloud services for an organization?
Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
Which of the following is the biggest concern or challenge with using encryption?
Which of the following APIs are most commonly used within a cloud environment?
Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
From a legal perspective, what is the most important first step after an eDiscovery order has been received by the cloud provider?
Which type of audit report does many cloud providers use to instill confidence in their policies, practices, and procedures to current and potential customers?
Which type of cloud model typically presents the most challenges to a cloud customer during the "destroy" phase of the cloud data lifecycle?
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
Which jurisdiction lacks specific and comprehensive privacy laws at a national or top level of legal authority?
What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?
GAAPs are created and maintained by which organization?
Which technology is NOT commonly used for security with data in transit?
When is a virtual machine susceptible to attacks while a physical server in the same state would not be?
Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions?
Which crucial aspect of cloud computing can be most threatened by insecure APIs?
Which of the following service capabilities gives the cloud customer the most control over resources and configurations?
Which of the following is a commonly used tool for maintaining system configurations?
What is an often overlooked concept that is essential to protecting the confidentiality of data?
Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?
What changes are necessary to application code in order to implement DNSSEC?
Which of the following would be a reason to undertake a BCDR test?
What does the REST API use to protect data transmissions?
Which European Union directive pertains to personal data privacy and an individual's control over their personal data?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
What provides the information to an application to make decisions about the authorization level appropriate when granting access?
Which of the following is NOT one of five principles of SOC Type 2 audits?
Where is an XML firewall most commonly deployed in the environment?
What is the minimum regularity for testing a BCDR plan to meet best practices?
Which of the following should NOT be part of the requirement analysis phase of the software development lifecycle?
Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?
Which value refers to the percentage of production level restoration needed to meet BCDR objectives?
What process is used within a clustered system to provide high availability and load balancing?
What is a standard configuration and policy set that is applied to systems and virtual machines called?
Which crucial aspect of cloud computing can be most threatened by insecure APIs?
Which of the following provides assurance, to a predetermined acceptable level of certainty, that an entity is indeed who they claim to be?
Web application firewalls (WAFs) are designed primarily to protect applications from common attacks like:
When an organization is considering a cloud environment for hosting BCDR solutions, which of the following would be the greatest concern?
APIs are defined as which of the following?
Which of the following is NOT one of the components of multifactor authentication?
A localized incident or disaster can be addressed in a cost-effective manner by using which of the following?
Which kind of SSAE audit report is a cloud customer most likely to receive from a cloud provider?
When beginning an audit, both the system owner and the auditors must agree on various aspects of the final audit report.
Which of the following would NOT be something that is predefined as part of the audit agreement?
You need to gain approval to begin moving your company's data and systems into a cloud environment. However, your CEO has mandated the ability to easily remove your IT assets from the cloud provider as a precondition.
Which of the following cloud concepts would this pertain to?
Without the extensive funds of a large corporation, a small-sized company could gain considerable and cost-effective services for which of the following concepts by moving to a cloud environment?
Deviations from the baseline should be investigated and __________________.
What is a key capability or characteristic of PaaS?
What is the term we use to describe the general ease and efficiency of moving data from one cloud provider either to another cloud provider or down from the cloud?
As a result of scandals involving publicly traded corporations such as Enron, WorldCom, and Adelphi, Congress passed legislation known as:
Different security testing methodologies offer different strategies and approaches to testing systems, requiring security personnel to determine the best type to use for their specific circumstances.
What does dynamic application security testing (DAST) NOT entail that SAST does?
Which of the following frameworks focuses specifically on design implementation and management?
Which ITIL component is focused on anticipating predictable problems and ensuring that configurations and operations are in place to prevent these problems from ever occurring?
The BC/DR kit should include all of the following except: