You are the security subject matter expert (SME) for an organization considering a
transition from the legacy environment into a hosted cloud provider 's data center.
One of the challenges you 're facing is whether the cloud provider will be able to
comply with the existing legislative and contractual frameworks your organization is
required to follow. This is a _________ issue.
a. Resiliency
b. Privacy
c. Performance
d. Regulatory
D
76. You are the security subject matter expert (SME) for an organization considering
a transition from the legacy environ ment into a hosted cloud provider 's data center.
One of the challenges you 're facing is whether the cloud provider will be able to
allow your organization to substantiate and determine with some assurance that all
of the contract terms are being met. This is a(n) ____________ issue.
a. Regulatory
b. Privacy
c. Resiliency
d. Auditability
D
77. Encryption is an essential tool for affording security to cloud-based operations.
While it is possible to encrypt every system, piece of data, and transaction that takes
place on the cloud, why might that not be the optimum choice for an organization?
a. K ey length variances don 't provide any actual additional security.
b. It would cause additional processing overhead and time delay.
c. It might result in vendor lockout.
d. The data subjects might be upset by this.
B
78. Encryption is an essential tool for affording security to cloud-based operations.
While it is possible to encrypt every system, piece of data, and transaction that takes
place on the cloud, why might that not be the optimum choice for an organization?
a. It could increase the possibility of physical theft.
b. Encryption won 't work throughout the environment.
c. The protection might be disproportionate to the value of the asset(s).
d. Users will be able to see everything within the organization.
C
79. Which of the following is not an element of the identification component of
identity and access management (IAM)?
a. Provisioning
b. Management
c. Discretion
d. Deprovisioning
C
80. Which of the following entities is most likely to play a vital role in the identity
provisioning aspect of a user 's experience in an organization?
Category | Exams and Certifications |
Comments | 0 |
Rating | |
Sales | 0 |