Which type of controls are the SOC Type 1 reports specifically focused on?
What does dynamic application security testing (DAST) NOT entail?
Which of the cloud cross-cutting aspects relates to the requirements placed on a system or application by law, policy, or requirements from standards?
The SOC Type 2 reports are divided into five principles.
Which of the five principles must also be included when auditing any of the other four principles?
What concept does the "D" represent with the STRIDE threat model?
What does the REST API use to protect data transmissions?
Which crucial aspect of cloud computing can be most threatened by insecure APIs?
Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?
Which OSI layer does IPsec operate at?
What is the concept of segregating information or processes, within the same system or application, for security reasons?
How many additional DNS queries are needed when DNSSEC integrity checks are added?
Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?
Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed?
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?
Which audit type has been largely replaced by newer approaches since 2011?