Question: 1
You are the security subject matter expert (SME) for an organization considering a transition from the legacy environment into a hosted cloud provider's data center.
One of the challenges you're facing is whether the provider will have undue control over your data once it is within the provider's data center; will the provider be able to hold your organization hostage because they have your data?
This is a(n) _________ issue.
Response:
Question: 2
Firewalls can detect attack traffic by using all these methods except ____________.
Response:
Question: 3
What is a form of cloud storage where data is stored as objects, arranged in a hierarchal structure, like a file tree?
Response:
Question: 4
Administrative penalties for violating the General Data Protection Regulation (GDPR) can range up to ____________.
Response:
Question: 5
What is a cloud storage architecture that manages the data in caches of copied content close to locations of high demand?
Response: