Which of the following systems is used to employ a variety of different techniques to discover and alert on threats and potential threats to systems and networks?
Many aspects and features of cloud computing can make eDiscovery compliance more difficult or costly.
Which aspect of cloud computing would be the MOST complicating factor?
Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?
With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.
What is the term associated with this determination?
Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.
Which of the following is the optimal humidity level, as established by ASHRAE?
Where is a DLP solution generally installed when utilized for monitoring data at rest?
Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?
Which of the following is not a risk management framework?
What does a cloud customer purchase or obtain from a cloud provider?
Data center and operations design traditionally takes a tiered, topological approach.
Which of the following standards is focused on that approach and is prevalently used throughout the industry?
Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?
In which cloud service model is the customer required to maintain the OS?
Cryptographic keys for encrypted data stored in the cloud should be ________________ .
Which is the lowest level of the CSA STAR program?