1. As part of a new security initiative, you have been asked to provide data classifications for all organizational data that is stored on servers. As part of your research, you must interview the data owners. Which staff are most likely to be considered data owners?
A) CIO and CSO B) physical security manager and business unit managers C) business unit managers and CEO D) business unit managers and CIO
2. Which of the following is an application and protocol that is used to remotely log in to another computer using a secure tunnel?
A) S/MIME B) CSP C) SSH D) Microsoft CryptoAPI (CAPI)
3. Which statement is not true regarding an organization - s sales staff?
A) The sales staff - s devices are rarely targets of attackers. B) The sales staff is rarely concerned with organizationalsecurity. C) The sales staff will often use publicly available Internetconnections. D) The sales staff has unique security issues.
4. When using XACML as an access control policy language, which of the following is the entity that is protecting the resource that the subject (a user or an application) is attempting to access?
A) PDP B) PEP C) FRR D) RAR
5. Management expresses concerns about using multitenant public cloud solutions to store organizational data. You explain thattenant data in a multitenant solution is quarantined from other tenants - data using tenant IDs in the data labels. What is thiscondition referred to?
A) data isolation B) data aggregation C) data purging D) data remnants
1. Right Answer: D Explanation: The business unit managers and the chief information officer (CIO) are most likely to be considered data owners.
2. Right Answer: C Explanation: Secure Shell (SSH) is an application and protocol that is used to remotely log in to another computer using a secure tunnel. After a session key is exchanged and the secure channel is established, all communication between the two computers is encrypted over the secure channel.
3. Right Answer: A Explanation: The sales staff s devices are often targets for attackers.
4. Right Answer: B Explanation: A policy enforcement point (PEP) is an entity that is protecting the resource that the subject (a user or an application) is attempting to access. When it receives a request from a subject, it creates an XACML request based on the attributes of the subject, the requested action, the resource, and other information.
5. Right Answer: A Explanation: Data isolation ensures that tenant data in a multitenant solution is isolated from other tenants data via tenant IDs in the data labels.
Leave a comment