Q&As (Latest Update 2025)(1000+ Questions answered)
Which phase of the cloud data life cycle allows both read and process functions to
be performed?
A Create
B Archive
C Store
D Share - correct answers A
Which phase of the cloud data security life cycle typically occurs simultaneously
with creation?
A Share
B Store
C Use
D Destroy - correct answers B
,Which phase of the cloud data life cycle uses content delivery networks?
A Destroy
B Archive
C Share
D Create - correct answers C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use
C Destroy
D Store - correct answers C
Which cloud data storage architecture allows sensitive data to be replaced with
unique identification symbols that retain all the essential information about the
data without compromising its security?
A Randomization
,B Obfuscation
C Anonymization
D Tokenization - correct answers D
Which methodology could cloud data storage utilize to encrypt all data associated
in an infrastructure as a service (IaaS) deployment model?
A Sandbox encryption
B Polymorphic encryption
C Client-side encryption
D Whole-instance encryption - correct answers D
There is a threat to a banking cloud platform service. The developer needs to
provide inclusion in a relational database that is seamless and readily searchable
by search engine algorithms.
Which platform as a service (PaaS) data type should be used?
A Short-term storage
B Structured
, C Unstructured
t
D Long-term storage - correct answers
t t t t t t B
Which platform as a service (PaaS) storage architecture should be used if an
t t t t t t t t t t t t
organization wants to store presentations, documents, and audio files?
t t t t t t t t t
t
A Relational database
t t
B Block
t
C Distributed
t
D Object - correct answers
t t t t t D
Which technique scrambles the content of data using a mathematical algorithm
t t t t t t t t t t
while keeping the structural arrangement of the data?
t t t t t t t t
t
A Dynamic masking
t t
B Format-preserving encryption
t t
C Proxy-based encryption
t t
D Tokenization - correct answers
t t t t t B
Which encryption technique connects the instance to the encryption instance that
t t t t t t t t t t
handles all crypto operations?
t t t t