An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?
Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?
Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?
A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?
Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?
Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
When should a cloud service provider delete customer data?
Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?
An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?