Question 126

To BEST prevent a data breach from happening, cryptographic keys should be:
  • Question 127

    When establishing cloud governance, an organization should FIRST test by migrating:
  • Question 128

    Which of the following is MOST important to consider when developing an effective threat model during the introduction of a new SaaS service into a customer organization's architecture? The threat model:
  • Question 129

    Why should the results of third-party audits and certification be relied on when analyzing and assessing the cybersecurity risks in the cloud?
  • Question 130

    In all three cloud deployment models, (laaS, PaaS, and SaaS), who is responsible for the patching of the hypervisor layer?