Not seeing how it could be A since IRM isn't primarily about encryption, it's more usage control. Option C lets you actually manage what people can do with the content, even after it's been downloaded or shared. Encryption (A) is a secondary feature in this context. I think C makes the most sense here, unless I'm missing something subtle from the question wording. Thoughts?
I don’t think it’s B or D, those are easy traps. C is the Commerce Dept export control, not ITAR which relates to military. Seen this type before in some practice sets.
I actually think A (ITAR) fits better since it covers export controls for lots of tech, not just military. EAR is more about commercial use, right? Maybe I'm mixing them up but Commerce handles some ITAR regs too if I remember right. Open to being corrected here!
A is wrong, C. EAR (Export Administration Regulations) are managed by the U.S. Commerce Dept for regulating most technology exports. ITAR (A) is a trap here since that's handled by State and covers military-related exports. I've seen similar wording on practice, pretty sure C is what they want. Let me know if anyone sees it differently.
A since KVM is a hypervisor and not used as an end-user secure access method like VPN or HTTPS. Lot of folks might get tripped up thinking every technical term is an access tech, but KVM just hosts the VMs. Pretty sure on this but happy to hear other reasoning if you see it different.
Tokenization requires two distinct ________
Definitely A for this one. Multi-cloud plus real-time replication gives you the best shot at both low RTO and RPO-way better than daily backups or cold site options. Cloud provider guarantees (D) aren't nearly enough if the CRM is truly critical. I think this matches ISC2's focus, but let me know if you see it differently.
I picked C because asymmetric encryption seems stronger for key management, and IPSec does encrypt in transit. But now I’m realizing customer-managed keys in D probably match HIPAA compliance better. Anyone else thought C looked close?
Option D makes sense, it's about a bastion host that's hardened to only do what it's supposed to when exposed on the internet. Firewall and proxy are more about traffic control, not hosting the service itself. I think this is right, unless I'm missing something?
That would be D, bastion. It's all about a hardened host set up for just specific public services. Proxy (B) sounds secure too but it doesn't actually run the operation, just forwards requests. Think I've seen this phrasing in practice sets before, so I'm pretty confident.
A imo, had something like this in a mock exam. Orchestration covers managing multiple automated tasks together, not just automating an individual step. Since the question talks about complex and distributed operations, that's orchestration more than plain automation. Pretty sure about A but open to other takes.
Option B is the advantage that comes up most in the official guides and practice tests for cloud security. Assigning roles instead of fiddling with individual permissions saves a ton of admin work, especially as user numbers grow. I think that's what they're looking for here, but let me know if anyone reads it differently!
I went with A. I thought giving users access to all resources could be seen as an advantage if the org wants fewer restrictions, especially in less sensitive setups. Not fully convinced now re-reading it, but that's what made sense to me initially. Anyone else consider A?