1.
Which data state would be most likely to use TLS as a protection mechanism?
2.
You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers. Which of the following would be the most appropriate action to take first?
3.
If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?
4.
Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?
5.
Which of the following is considered an internal redundancy for a data center?
6.
Which of the following threat types involves the sending of invalid and manipulated requests through a user's client to execute commands on the application under their own credentials?
7.
With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first. What is the term associated with this determination?
8.
In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?
9.
Where is a DLP solution generally installed when utilized for monitoring data in use?
10.
Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?