Which of the following does NOT relate to the hiding of sensitive data from data sets?
Which of the following cloud aspects complicates eDiscovery?
Which of the following threat types can occur when baselines are not appropriately applied or unauthorized changes are made?
What does SDN stand for within a cloud environment?
Which of the following is NOT a regulatory system from the United States federal government?
What is the only data format permitted with the SOAP API?
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
What does the management plane typically utilize to perform administrative functions on the hypervisors that it has access to?
Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?
Which publication from the United States National Institute of Standards and Technology pertains to defining cloud concepts and definitions for the various core components of cloud computing?
Which data formats are most commonly used with the REST API?
Which of the following represents a control on the maximum amount of resources that a single customer, virtual machine, or application can consume within a cloud environment?
How is an object stored within an object storage system?
Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?
What controls the formatting and security settings of a volume storage system within a cloud environment?