126 Typically, SSDs are ___________________.Impossible to destroy physicallyNot vulnerable to degaussingSubject to a longer warrantyProtected by international trade laws
127 Of the following control techniques/solutions, which can be combined to enhance the protections offered by each?Fences/firewallsAsset inventories/personnel trainingData dispersion/encryptionIntrusion prevention solutions/intrusion detection solutions
128 Of the following control techniques/solutions, which can be combined to enhance the protections offered by each?Razor tape/background checksLeast privilege/generatorsDLP/DRMPersonnel badging/secure baselines
129 Risk assessment is the responsibility of ___________________.Companies offering managed cloud servicesRegulatory bodiesEvery organizationLegislative entities
130 Which entity can best aid the organization in avoiding vendor lock-in?Senior managementThe IT security officeGeneral counselThe cloud security representative
131 Perhaps the best method for avoiding vendor lock-out is also a means for enhancing BC/DR capabilities. This is ___________________.Having a warm site within 250 miles of the primary production environmentUsing one cloud provider for primary production and another for backup purposesBuilding a data center above the flood plainCross-training all personnel
132 ___________________ can often be the result of inadvertent activity.DDoSPhishingSprawlDisasters
133 Of the following, which is probably the most significant risk in a managed cloud environment?DDoSManagement plane breachGuest escapePhysical attack on the utility service lines
134 What is the optimal number of entrances to the cloud data center campus?OneTwoThreeFour
135 The cloud data center campus physical access point should include all of the following except ___________________.Reception areaVideo surveillanceBadging procedureMantrap structures
136 Where should multiple egress points be included?At the power distribution substationWithin the data centerIn every building on the campusIn the security operations center
137 Which of the following is a risk in the cloud environment that does not exist or is not as prevalent in the traditional environment?DDoSIsolation failureExternal attackInternal attack
138 All security controls necessarily ___________________.Are expensiveDegrade performanceRequire senior management approvalWill work in the cloud environment as well as they worked in the traditional environment
139 Which of the following is a risk in the cloud environment that does not exist or is not as prevalent in the traditional environment?Legal liability in multiple jurisdictionsLoss of productivity due to DDoSAbility of users to gain access to their physical workplaceFire
140 Which of the following is a risk in the cloud environment that does not exist or is not as prevalent in the traditional environment?Loss of availability due to DDoSLoss of value due to DDoSLoss of confidentiality due to DDoSLoss of liability due to DDoS
141 DDoS attacks do not affect ___________________ for cloud customers.ProductivityAvailabilityConnectivityIntegrity
142 Sprawl in the cloud can lead to significant additional costs to the organization because of ___________________.Larger necessary physical footprintMuch larger utility consumptionSoftware licensingRequisite additional training
143 It is best to use variables in ___________________.Baseline configurationsSecurity control implementationsContract languageBC/DR tests
Конец ознакомительного фрагмента.
Текст предоставлен ООО «ЛитРес».
Прочитайте эту книгу целиком, на ЛитРес.
Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.