Topic 1: Exam Pool A
Who will determine data classifications for the cloud customer?
A.
The cloud provider
B.
NIST
C.
Regulators
D.
The cloud customer
The cloud customer
_______ is the most prevalent protocol used in identity federation.
A.
HTTP
B.
SAML
C.
FTP
D.
WS-Federation
SAML
Which cloud storage type uses an opaque value or descriptor to categorize and organize
data?
Response:
A.
Volume
B.
Object
C.
Structured
D.
Unstructured
Unstructured
What does nonrepudiation mean?
Response:
A.
Prohibiting certain parties from a private conversation
B.
Ensuring that a transaction is completed before saving the results
C.
Ensuring that someone cannot turn off auditing capabilities while performing a function
D.
Preventing any party that participates in a transaction from claiming that it did not
Preventing any party that participates in a transaction from claiming that it did not
Which of the following data sanitation methods would be the MOST effective if you needed
to securely remove data as quickly as possible in a cloud environment?
Response:
A.
Zeroing
B.
Cryptographic erasure
C.
Overwriting
D.
Degaussing
Cryptographic erasure
Which of the following is the recommended operating range for temperature and
humidity in a data center?
Response:
A.
Between 62 °F - 81 °F and 40% and 65% relative humidity
B.
Between 64 °F - 81 °F and 40% and 60% relative humidity
C.
Between 64 °F - 84 °F and 30% and 60% relative humidity
D.
Between 60 °F - 85 °F and 40% and 60% relative humidity
Between 64 °F - 81 °F and 40% and 60% relative humidity
A honeypot should contain _________ data.
Response:
A.
Raw
B.
Production
C.
Useless
D.
Sensitive
Useless
When an organization considers cloud migrations, the organization’s software
developers will need to know which _______ and _______ which the organization will
be using, in order to properly and securely create suitable applications.
A.
Geographic location, native language
B.
Legal restrictions, specific ISP
C.
Service model, deployment model
D.
Available bandwidth, telecommunications country code
Service model, deployment model
What type of device is often leveraged to assist legacy applications that may not
have the programmatic capability to process assertions from modern web services?
A.
Web application firewall
B.
XML accelerator
C.
Relying party
D.
XML firewall
XML accelerator
Which of the following management risks can make an organization’s cloud
environment unviable?
Response:
A.
Insider trading
B.
VM sprawl
C.
Hostile takeover
D.
Improper personnel selection
VM sprawl
Every cloud service provider that opts to join the CSA STAR program registry must
complete a ___________.
A.
SOC 2, Type 2 audit report
B.
Consensus Assessment Initiative Questionnaire (CAIQ)
C.
NIST 800-37 RMF audit
D.
ISO 27001 ISMS review
Consensus Assessment Initiative Questionnaire (CAIQ)
Which of the following best describes SAML?
Response:
A.
A standard for developing secure application management logistics
B.
A standard for exchanging authentication and authorization data between security
domains
C.
A standard for exchanging usernames and passwords across devices
D.
A standard used for directory synchronization
A standard for exchanging authentication and authorization data between security
domains
Page 6 out of 43 Pages |
Previous |