- (Exam Topic 1)
You have been tasked with creating an audit scope statement and are making your project outline. Which of the following is NOT typically included in an audit scope statement?
Correct Answer:D
- (Exam Topic 3)
Which of the following data-sanitation approaches are always available within a cloud environment? Response:
Correct Answer:D
- (Exam Topic 1)
What is used with a single sign-on system for authentication after the identity provider has successfully authenticated a user?
Response:
Correct Answer:A
- (Exam Topic 3)
What is the main reason virtualization is used in the cloud? Response:
Correct Answer:C
- (Exam Topic 1)
Under EU law, a cloud customer who gives sensitive data to a cloud provider is still legally responsible for the damages resulting from a data breach caused by the provider; the EU would say that it is the cloud customer’s fault for choosing the wrong provider.
This is an example of insufficient ______ .
Correct Answer:C