Your answers are shown below:
1. Which common components of big data is focused on the mechanisms used to ingest
large volumes of data, often of a
... [Show More] streaming nature?
Distributed information
Distributed storage
Distributed processing
Distributed attribution
Distributed data collection
2. What is a core tenant of risk management?
Risk insurance covers all financial losses, including loss of customers
The provider is accountable for all risk management
The consumer are completely responsible for all risks
If there is still residual risk after assessments and controls are in place, you must
accept the risk
You can manage, transfer, accept or avoid the risks
3. When designing an encryption system, you should start with a threat model
FALSE
TRUE
4. CCM: in the CCM tool (encryption and key management) is an example of which of
the following?
Risk impact
Domain
Control specification
None of the above
5. Which facet is focused on protecting the management plane components, such as
web and API servers from attacks?
Logging and alerting
Perimeter security
Customer authentication
Authorization and entitlements
External authentication
6. Which phase of incident response life cycle includes creating and validating alerts?
Post-mortem
detection and analysis
Auditing and logging
Containment, eradication and recovery
Preparation
7. If in certain litigations and investigations, the actual cloud application or environment
itself is relevant to resolving the dispute in the litigation or the investigation, how is likely
the information to be obtained?
It would never be obtained in this situation
It would require an act of war
It would require a previous contractual agreement to obtain the application or
access to the environment
It would require a previous access agreement
It may require a subpoena of the provider directly
8. What is the order of the main phases of secure applications design and
development?
Train, analyze, develop, test, implement
Analyze, define, design, develop, test
Analyze, design, develop, test, implement
Train, define, develop, test, implement
Train, define, design, develop, test
9. If the management plane has been breached, you should confirm the
templates/configurations for your infrastructure or applications have not also been
compromised
False
TRUE
10. You have a business relationship with a cloud provider for all sales management
functionalities. Through the API and SDK, you have customized the interface and some
functionality, but the back end service is done through the cloud provider. In this
relationship, which service is completed by [Show Less]