MANAGING CLOUD SECURITY (C838)
Q: 1
Which device is used to create and manage encryption keys used for data transmission in a cloud-
based environment?
Options
Q: 2
An organization needs to provide space where security administrators can centrally monitor network
traffic and events and respond to threats or outages. What should the organization create?
Options
Q: 3
An organization negotiates a new contract with a cloud provider and wants to ensure that its critical
business data is protected if the cloud provider goes out of business. For this reason, the organization
wants the cloud provider to store a copy of the organization's data with a neutral third party, which
would release the data in case the provider is unable to meet its obligations. Which type of provision
should be included in the contract to ensure this?
Options
Q: 4
Which phase of the cloud data life cycle involves the process of crypto-shredding?
Options
Q: 5
Which data destruction technique involves encrypting the data, followed by encrypting the resulting
keys with a different engine, and then destroying the keys resulting from the second encryption
round?
Options
Q: 6
Which release management term describes the process from code implementation to code review
and approval to automated testing and then to production deployment?
Options
Q: 7
Which category of cloud service provides on-demand, self-service access to basic building blocks,
such as virtualized servers, block storage, and networking capacity, that can be used to create custom
IT solutions?
Options
Q: 8
A group of DevOps engineers adopted the network-as-code methodology to manage network
infrastructure. During a code release, the engineers find a bug that is causing issues on a production
site. Which safeguard will allow the engineers to restore functionality to the production site?
Options
Q: 9
An organization experienced an unplanned event. As a result, the customers using the web
application face a loss of service. What does the incident generated in this situation seek to resolve?
Options
Q: 10
An organization wants to ensure that all entities trust any certificate generated internally in the
organization. What should be used to generate these certificates?
Options
Question 1 of 10