What are the U.S. Commerce Department controls on technology exports known as?
You are responsible for securing a cloud-native application that processes sensitive user data. To prevent data breaches and ensure compliance, you need to implement effective traffic inspection mechanisms. Which of the following methods is most suitable for inspecting traffic in a cloud environment?
DPI (A) lets you actually see inside the packets at layer 7, so you catch sensitive stuff slipping through. NSGs and endpoint security are more basic controls. Pretty sure it's A here, but open to other thoughts.
KVM isn't used by users for secure access, it's just the virtualization layer. Pretty sure A is right here.
Why would TLS or HTTPS be a possible answer here? Both are actually used for securing access, but KVM just runs the underlying VMs. Am I missing something about how they'd expect to see VPN used though?
Definitely A for this one. Multi-cloud plus real-time replication gives you the best shot at both low RTO and RPO-way better than daily backups or cold site options. Cloud provider guarantees (D) aren't nearly enough if the CRM is truly critical. I think this matches ISC2's focus, but let me know if you see it differently.
B tbh, daily backups to an offsite location seem like they could help with data loss if there's a major disruption. You'd at least have a copy to restore from, so less risk of losing everything. Not sure if the downtime would be as minimal as with multi-cloud though. Anybody think backups alone could be enough here?
I picked C because asymmetric encryption seems stronger for key management, and IPSec does encrypt in transit. But now I’m realizing customer-managed keys in D probably match HIPAA compliance better. Anyone else thought C looked close?
Your company is moving its critical business applications to a public cloud platform. As part of the security design, you need to implement controls that ensure only authorized personnel can access sensitive resources within the cloud environment. Which of the following approaches is most effective for ensuring that users are properly authorized to access sensitive resources in the cloud?
Option C
Option D makes sense, it's about a bastion host that's hardened to only do what it's supposed to when exposed on the internet. Firewall and proxy are more about traffic control, not hosting the service itself. I think this is right, unless I'm missing something?
That would be D, bastion. It's all about a hardened host set up for just specific public services. Proxy (B) sounds secure too but it doesn't actually run the operation, just forwards requests. Think I've seen this phrasing in practice sets before, so I'm pretty confident.
I thought B fits since a proxy sits between users and the service, kind of acting as a secure layer for just the allowed operations. Saw something similar in exam reports. Not 100% though, maybe someone disagrees?
A imo, had something like this in a mock exam. Orchestration covers managing multiple automated tasks together, not just automating an individual step. Since the question talks about complex and distributed operations, that's orchestration more than plain automation. Pretty sure about A but open to other takes.