with Certified Answers.
"There is a threat to a banking cloud platform service. The developer needs to
provide inclusion in a relational database that is seamless and readily searchable
by search engine algorithms. Which platform as a service (PaaS) data type should
be used?
(A) Structured
(B) Unstructured
(C) Long-term storage
(D) Short-term storage" - Answer: Structured
"Which platform as a service (PaaS) storage architecture should be used if an
organization wants to store presentations, documents, and audio files?
(A) Block
(B) Object
(C) Distributed
(D) Relational database" - Answer: Object
Page 1 of 39
,"Which technique scrambles the content of data using a mathematical algorithm
while keeping the structural arrangement of the data?
(A) Tokenization
(B) Dynamic masking
(C) Proxy-based encryption
(D) Format-preserving encryption" - Answer: Format-preserving encryption
"Which encryption technique connects the instance to the encryption instance
that handles all crypto operations?
(A) Proxy
(B) Database
(C) Server-side
(D) Externally managed" - Answer: Proxy
"Which type of control should be used to implement custom controls that
safeguard data?
(A) Application level
(B) Management plane
(C) Options for access
(D) Public and internal sharing" - Answer: Application level
"Which phase of the cloud data lifecycle allows both read and process functions to
be performed?
(A) Share
(B) Store
Page 2 of 39
,(C) Create
(D) Archive" - Answer: Create
"Which phase of the cloud data security lifecycle typically occurs simultaneously
with creation?
(A) Use
(B) Share
(C) Store
(D) Destroy" - Answer: Store
"Which phase of the cloud data life cycle uses content delivery networks?
(A) Share
(B) Create
(C) Destroy
(D) Archive" - Answer: Share
"Which phase of the cloud data life cycle is associated with crypto-shredding?
(A) Use
(B) Store
(C) Share
(D) Destroy" - Answer: Destroy
"Which cloud data storage architecture allows sensitive data to be replaced with
unique identification symbols that retain all the essential information about the
data without compromising its security?
Page 3 of 39
, (A) Obfuscation
(B) Tokenization
(C) Anonymization
(D) Randomization" - Answer: Tokenization
"Which methodology could cloud data storage utilize to encrypt all data
associated in an infrastructure as a service (IaaS) deployment model?
(A) Sandbox encryption
(B) Client-side encryption
(C) Polymorphic encryption
(D) Whole-instance encryption" - Answer: Whole-instance encryption
"Which phase of the cloud data lifecycle allows both read and process functions to
be performed?
(A) Share
(B) Store
(C) Create
(D) Archive" - Answer: Create
"Which phase of the cloud data security lifecycle typically occurs simultaneously
with creation?
(A) Use
(B) Share
(C) Store
(D) Destroy" - Answer: Store
Page 4 of 39