Reference no: EM133402760
Question
1. Which security information and event management concept focuses on account and service hijacking issues?
Digital forensics
Trust
Lightweight directory access protocol
Access control
2. Which set of United States federal laws specifies that subcontractors must agree to observe reasonable security measures?
ACI and APP
GLBA and HIPAA
PCI-DSS and NIST
NIS and GDPR
3. Which item is used to manage the logical elements of data center design?
Transport
Network
Resource pool
Control plane
4. Which security measure controls virtualization in the cloud?
Securing the hypervisor
Managing image assets
Monitoring and logging
Using a dedicated hosting
5. A breach caused by lack of security management resulted in a Civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight.
Who should be contacted?
Board of director members
Cloud customer
High-level government agencies
IT department
6. Which subject matter expert is relied upon to draft policies related to the organization's operations in the cloud?
Attorneys
Senior management
Risk management
CCSP practitioner
7. Who should be part of formal tasking when conducting testing for business continuity management?
Moderators
Governing bodies
Organizational personnel
External consultants