00:00

QUESTION 106

- (Exam Topic 4)
What is the experimental technology that might lead to the possibility of processing encrypted data without having to decrypt it first?

Correct Answer: D
AES is an encryption standard. Link encryption is a method for protecting communications traffic. One-time pads are an encryption method.

QUESTION 107

- (Exam Topic 4)
Hardening the operating system refers to all of the following except:

Correct Answer: C
Removing antimalware agents. Hardening the operating system means making it more secure. Limiting administrator access, closing unused ports, and removing unnecessary services and libraries all have the potential to make an OS more secure. But removing antimalware agents would actually make the system less secure. If anything, antimalware agents should be added, not removed.

QUESTION 108

- (Exam Topic 3)
Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.
Which of the following is NOT a technology for securing data in transit?

Correct Answer: C
DNSSEC is an extension of the normal DNS protocol that enables a system to verify the integrity of a DNS query resolution by signing it from the authoritative source and verifying the signing chain. It is not used for
securing data transmissions or exchanges. HTTPS is the most common method for securing web service and data calls within a cloud, and TLS is the current standard for encrypting HTTPS traffic. VPNs are widely used for securing data transmissions and service access.

QUESTION 109

- (Exam Topic 2)
Which type of audit report is considered a "restricted use" report for its intended audience?

Correct Answer: C
SOC Type 1 reports are considered "restricted use" reports. They are intended for management and stakeholders of an organization, clients of the service organization, and auditors of the organization. They are not intended for release beyond those audiences.

QUESTION 110

- (Exam Topic 4)
In which cloud service model is the customer required to maintain the OS?

Correct Answer: A
In IaaS, the service is bare metal, and the customer has to install the OS and the software; the customer then is responsible for maintaining that OS. In the other models, the provider installs and maintains the OS.