Question: 1
Which of the following is the best and only completely secure method of data destruction?
Response:
Question: 2
You are the security manager of a small firm that has just purchased a DLP solution to implement in your cloud-based production environment.
In order to get truly holistic coverage of your environment, you should be sure to include __________ as a step in the deployment process.
Response:
Question: 3
The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating in cloud computing.
According to the CSA, what is one reason the threat of insecure interfaces and APIs is so prevalent in cloud computing?
Response:
Question: 4
Which document will enforce uptime and availability requirements between the cloud customer and cloud provider?
Response:
Question: 5
All of the following are terms used to described the practice of obscuring original raw data so that only a portion is displayed for operational purposes, except:
Response: