Question 61
Where does the private cloud reside?
Question 62
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
Question 63
John's Laptop was stolen. He had saved all his passwords in a text file stored in his laptop. Adversary used the passwords from the text file and gained access to company's network and sensitive databases, of which John was the data base administrator. It resulted in theft of thousands of customer information. This incident could have been prevented by?
Question 64
According to ISO 27018. data processor has explicit control over how CSPs are to use PII.
Question 65
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.