00:00

QUESTION 36

- (Exam Topic 4)
What category of PII data can carry potential fines or even criminal charges for its improper use or disclosure?

Correct Answer: C
Regulated PII data carries legal and jurisdictional requirements, along with official penalties for its misuse or disclosure, which can be either civil or criminal in nature. Legal and protected are similar terms, but neither is the correct answer in this case. Contractual requirements can carry financial or contractual impacts for the improper use or disclosure of PII data, but not legal or criminal penalties that are officially enforced.

QUESTION 37

- (Exam Topic 3)
Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?

Correct Answer: D
Object storage is typically used to house virtual machine images because it is independent from other systems and is focused solely on storage. It is also the most appropriate for handling large individual files. Volume storage, because it is allocated to a specific host, would not be appropriate for the storing of virtual images. Structured and unstructured are storage types specific to PaaS and would not be used for storing items used throughout a cloud environment.

QUESTION 38

- (Exam Topic 1)
What is the biggest concern with hosting a key management system outside of the cloud environment?

Correct Answer: C
When a key management system is outside of the cloud environment hosting the application, availability is a primary concern because any access issues with the encryption keys will render the entire application unusable.

QUESTION 39

- (Exam Topic 2)
Which audit type has been largely replaced by newer approaches since 2011?

Correct Answer: C
SAS-70 reports were replaced in 2011 with the SSAE-16 reports throughout the industry.

QUESTION 40

- (Exam Topic 4)
Countermeasures for protecting cloud operations against external attackers include all of the following except:

Correct Answer: B
Background checks are controls for attenuating potential threats from internal actors; external threats aren’t likely to submit to background checks.