Question 61

Where does the private cloud reside?
  • Question 62

    Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
  • Question 63

    John's Laptop was stolen. He had saved all his passwords in a text file stored in his laptop. Adversary used the passwords from the text file and gained access to company's network and sensitive databases, of which John was the data base administrator. It resulted in theft of thousands of customer information. This incident could have been prevented by?
  • Question 64

    According to ISO 27018. data processor has explicit control over how CSPs are to use PII.
  • Question 65

    APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.