- (Exam Topic 1)
The Cloud Security Alliance (CSA) publishes, the Notorious Nine, a list of common threats to organizations participating in cloud computing.
According to the CSA, all of the following activity can result in data loss except ______ .
Correct Answer:B
- (Exam Topic 1)
Who is the entity identified by personal data? Response:
Correct Answer:D
- (Exam Topic 1)
The use of which of the following technologies will NOT require the security dependency of an operating system, other than its own?
Correct Answer:B
- (Exam Topic 3)
FM-200 has all the following properties except ______.
Response:
Correct Answer:C
- (Exam Topic 1)
Which concept of cloud computing pertains to the ability to reuse components and services of an application for other purposes?
Correct Answer:B
- (Exam Topic 2)
Which of the following characteristics is associated with digital rights management (DRM) solutions (sometimes referred to as information rights management, or IRM)?
Response:
Correct Answer:A