Questions and Corresponding Answers
with Surety of 100% Pass Mark
Which phase of the cloud data lifecycle allows both read and process
functions to be performed? - 🧠 ANSWER ✔✔Create
Which technique scrambles the content of data using a mathematical
algorithm while keeping the structural arrangement of the data? - 🧠
ANSWER ✔✔Format-preserving encryption
Which encryption technique connects the instance to the encryption
instance that handles all crypto operations? - 🧠 ANSWER ✔✔Proxy
Which type of control should be used to implement custom controls that
safeguard data? - 🧠 ANSWER ✔✔Application level
A cloud administrator recommends using tokenization as an alternative to
protecting data without encryption. The administrator needs to make an
, authorized application request to access the data. Which step should occur
immediately before this action is taken? - 🧠 ANSWER ✔✔The application
stores the token
A company has recently defined classification levels for its data. During
which phase of the cloud data life cycle should this definition occur? - 🧠
ANSWER ✔✔Create
How is the compliance of the cloud service provider's legal and regulatory
requirements verified when securing personally identifiable information (PII)
data in the cloud? - 🧠 ANSWER ✔✔Third party audits and attestations
Which security strategy is associated with data rights management
solutions? - 🧠 ANSWER ✔✔Continuous auditing
What is a key capability of security information and event management? - 🧠
ANSWER ✔✔Centralized collection of big data
A security analyst is investigating an incident of access to a resource from
an unauthorized location. Which data source should the security analyst
use to investigate the incident? - 🧠 ANSWER ✔✔Packet capture file