Which cloud risk is associated with the supply chain due to dependency on legacy internal servers for application delivery to end users?
Which security testing method requires compliance with the cloud service provider’s terms of service?
Which type of risk comes from outsourcing significant vendor-specific investments for data, procedures, or processes to a cloud provider?
Which security control could be implemented as part of a layered physical defense at a cloud hosting site?
A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
Which data management activity is considered legal fair use of a copyrighted item?
Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?
An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?
A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?
An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?