Question 6
In ability to provide enough capacity to the cloud customer can lead to which of the following risk:
Question 7
Which is the set of technologies that are designed to detect conditions indicative of a security vulnerability in an application in its running state?
Question 8
According to Cloud Security Alliance logical model of cloud computing, which of the following defines the protocols and mechanisms that provide the interface between the infrastructure layer and the other layers.
Question 9
Which of the followinglS0 Standard provides Code of practice for information security controls based on IS0/IEC 27002for cloud services?
Question 10
CCM: A hypothetical company called: "Health4Sure" is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients.
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure's cloud service?
Which of the following approach would be most suitable to assess the overall security posture of Health4Sure's cloud service?