16.
When using transparent encryption of a database, where does the encryption engine reside?
- A.Within the database application itself
- B.At the application using the database
- C.On the instances attached to the volume
- D.In a key management system
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
In transparent encryption, the encryption key for a database is stored in the boot record of the database itself. |
17.
What is a type of assessment called that employs a set of methods, principles, or rules for
assessing risk based on non-numerical categories or levels?
- A.Quantitative assessment
- B.Qualitative assessment
- C.Hybrid assessment
- D.SOC 2
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A qualitative assessment is a set of methods or rules for assessing risk based on nonmathematical or categories or levels. One that uses those mathematical categories or levels is called a quantitative assessment. There is no such thing as a hybrid assessment, and an SOC 2 is an accounting report regarding control effectiveness. |
18.
What best describes the Cloud Security Alliance Cloud Controls Matrix?
- A.A set of regulatory requirements for cloud service providers
- B.A set of software development life cycle requirements for cloud service providers
- C.A security controls framework that provides mapping/cross relationships with the main industry-accepted security standards, regulations, and controls frameworks such as the ISO 27001/27002, ISACA’s COBIT, and PCI-DSS
- D.An inventory of cloud service security controls that are arranged into separate security domains
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The CCM cross-references many industry standards, laws, and guidelines. |
19.
When a conflict of laws occurs,______________ determines the jurisdiction in which
the dispute will be heard.
- A.Tort law
- B.Doctrine of Proper Law
- C.Common law
- D.Criminal law
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
The Doctrine of Proper Law is used when a dispute occurs over which jurisdiction will hear a case. Tort law refers to civil liability suits. Common law refers to laws regarding marriage, and criminal law refers to violations of state or federal criminal code. |
20.
Which one of the following is the most important security consideration when selecting a
new computer facility?
- A.Local law enforcement response times
- B.Location adjacent to competitor’s facilities
- C.Aircraft flight paths
- D.Utility infrastructure
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Of the answers given, option D is the most important. It is vital that any datacenter facility be close to sound facility resources such as power, water, and connectivity. |