An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?
Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?
Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?
Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?
Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?
Which action should be taken to ensure that unencrypted network traffic is protected?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?
An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?
Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?
Which term describes data elements that, when combined with other information, are used to single out an individual?
Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?
Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?
A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?
An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?
Which group should be notified for approval when a planned modification to an environment is scheduled?
Which characteristic of cloud computing refers to sharing physical assets among multiple customers?
Which security concept requires continuous identity and authorization checks to allow access to data?
Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?
What is the process of identifying and procuring stored data as evidence for legal purposes?