Home
You may like this!
16.
When using transparent encryption of a database, where does the encryption engine reside?
  • A.
    Within the database application itself
  • B.
    At the application using the database
  • C.
    On the instances attached to the volume
  • D.
    In a key management system
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
In transparent encryption, the encryption key for a database is stored in the boot record of the database itself.
Report
Name Email  
17.
What is a type of assessment called that employs a set of methods, principles, or rules for assessing risk based on non-numerical categories or levels?
  • A.
    Quantitative assessment
  • B.
    Qualitative assessment
  • C.
    Hybrid assessment
  • D.
    SOC 2
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A qualitative assessment is a set of methods or rules for assessing risk based on nonmathematical or categories or levels. One that uses those mathematical categories or levels is called a quantitative assessment. There is no such thing as a hybrid assessment, and an SOC 2 is an accounting report regarding control effectiveness.
Report
Name Email  
18.
What best describes the Cloud Security Alliance Cloud Controls Matrix?
  • A.
    A set of regulatory requirements for cloud service providers
  • B.
    A set of software development life cycle requirements for cloud service providers
  • C.
    A security controls framework that provides mapping/cross relationships with the main industry-accepted security standards, regulations, and controls frameworks such as the ISO 27001/27002, ISACA’s COBIT, and PCI-DSS
  • D.
    An inventory of cloud service security controls that are arranged into separate security domains
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The CCM cross-references many industry standards, laws, and guidelines.
Report
Name Email  
19.
When a conflict of laws occurs,______________ determines the jurisdiction in which the dispute will be heard.
  • A.
    Tort law
  • B.
    Doctrine of Proper Law
  • C.
    Common law
  • D.
    Criminal law
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The Doctrine of Proper Law is used when a dispute occurs over which jurisdiction will hear a case. Tort law refers to civil liability suits. Common law refers to laws regarding marriage, and criminal law refers to violations of state or federal criminal code.
Report
Name Email  
20.
Which one of the following is the most important security consideration when selecting a new computer facility?
  • A.
    Local law enforcement response times
  • B.
    Location adjacent to competitor’s facilities
  • C.
    Aircraft flight paths
  • D.
    Utility infrastructure
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Of the answers given, option D is the most important. It is vital that any datacenter facility be close to sound facility resources such as power, water, and connectivity.
Report
Name Email