Select the best definition of `compliance` from the options below.
A. The development of a routine that covers all necessary security measures.
B. The diligent habits of good security practices and recording of the same.
C. The timely and efficient ling of security reports.
D. The awareness and adherence to obligations, including the assessment and prioritization of corrective actions deemed necessary and appropriate.
E. The process of completing all forms and paperwork necessary to develop a defensible paper trail.
What does it mean if the system or environment is built automatically from a template?
A. Nothing.
B. It depends on how the automation is configured.
C. Changes made in production are overwritten by the next code or template change.
D. Changes made in test are overwritten by the next code or template change.
E. Changes made in production are untouched by the next code or template change.
What is true of Software defined Network firewalls?
A. They are policy sets that can only be applied to similar grouped assets
B. They require the use of static IP addresses
C. They are more difficult to manage
D. They are limited based on physical topology
E. They are not limited based on physical topology
In a cloud environment, how can you best determine data/information security risks and potential controls?
A. understand the cloud storage architecture in use
B. run a search on user data le
C. encrypt everything
D. identify the major operating system(s)
E. understand the related regulatory requirements
When the application components communicate directly with the cloud service, the management plane and metastructure might fall within the application security scope.
A. True
B. False
Installing security software designed for physical servers onto a virtualized server can result in severe degradation in performance.
A. False
B. True
Which of the following cloud deployment models represents a composition of two or more clouds that remain unique identities but are bound together by standardized or proprietary technology that enables data and application portability?
A. Public cloud
B. Hybrid cloud
C. Community cloud
D. Segregated cloud
E. None of the above
Which statement best describes the options for PaaS encryption?
A. PaaS is very diverse and may include client/application, database, and proxy encryption as well as other options.
B. PaaS is strictly limited to client/application, database and proxy encryption.
C. PaaS is sensitive to application updates and therefore must be constantly refreshed with relevant keys.
D. PaaS is very diverse and would most likely include le/folder and instance-managed encryption.
E. PaaS is limited to public networks.
Immutable workloads make it faster to roll out updated versions because applications must be designed to handle individual nodes going down.
A. False
B. True
Which security concept includes the policy, process, and internal controls comprising how an organization is run ?including the structures and policies of the leadership and other mechanisms for management?
A. Governance
B. Information security
C. Enterprise risk management
D. Information risk management
E. Compliance