EXAM 1LATEST UPDATE 2025/2026
QUESTIONS WITH ANSWERS (100% VERIFIED
ANSWERS)| GRADED A+
A poorly negotiated cloud service contract could result in all the following
detrimental effects except:
A Unfavorable terms
B Lack of necessary services
C Vendor lock-in
D Malware - correct answers D
Each of the following are dependency that must be considered when reviewing the
BIA after cloud migration except:
A The cloud provider's resellers
B The cloud provider's utilities
C The cloud provider's vendors
D The cloud provider's suppliers - correct answers A
Countermeasures for protecting cloud operations against internal threats include all
of the following except:
1|Page
Page 1
,A Broad contractual protections to ensure the provider is ensuring an extreme level
of trust in its own personnel
B Scalability
C DLP solutions
D Financial penalties for the cloud provider in the event of negligence or malice on
the part of its own personnel - correct answers B
Benefits for addressing BC/DR offered by cloud operations include all of the
following except:
A Distributed, remote processing, and storage of data
B Fast replication
C Regular backups offered by cloud providers
D Metered service - correct answers D
3|Page
Page 2
,Because of multitenancy, specific risks in the public cloud that don't exist in the
other cloud service models include all the following except:
A DoS/DDoS
B Escalation of privilege
C Risk of loss/disclosure due to legal seizures
D Information bleed - correct answers A
All of the following methods can be used to attenuate the harm caused by
escalation of privilege except:
A Extensive access control and authentication tools and techniques
B The use of automated analysis tools such as SIM, SIEM, and SEM solutions
C Periodic and effective use of cryptographic sanitization tools
D Analysis and review of all log data by trained, skilled personnel on a frequent
basis - correct answers C
5|Page
Page 3
, Countermeasures for protecting cloud operations against internal threats include all
of the following except:
A Masking and obfuscation of data for all personnel without need to know for raw
data
B Redundant ISPs
C Active electronic surveillance and monitoring
D Active physical surveillance and monitoring - correct answers B
All of the following are techniques to enhance the portability of cloud data, in
order to minimize the potential of vendor lock-in except:
A Use DRM and DLP solutions widely throughout the cloud operation
B Avoid proprietary data formats
7|Page
Page 4