Package deal
WGU C838 PACKAGE DEAL
WGU C838 PACKAGE DEAL
[Show more]WGU C838 PACKAGE DEAL
[Show more]Which phase of the cloud data lifecycle allows both read and process functions to be performed? - correct answer Create 
 
Which technique scrambles the content of data using a mathematical algorithm while keeping the structural arrangement of the data? - correct answer Format-preserving encryption ...
Preview 2 out of 7 pages
Add to cartWhich phase of the cloud data lifecycle allows both read and process functions to be performed? - correct answer Create 
 
Which technique scrambles the content of data using a mathematical algorithm while keeping the structural arrangement of the data? - correct answer Format-preserving encryption ...
NIST 800-145 Cloud Computing Definition 
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
 
 
Business Impact Analy...
Preview 4 out of 56 pages
Add to cartNIST 800-145 Cloud Computing Definition 
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
 
 
Business Impact Analy...
1x sold
What are the 4 characteristics of cloud computing? 
Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
 
 
 
What NIST publication number defines cloud computing? 
800-145 
 
 
 
 
What ISO/IEC standard provides information on cloud computing? 
17788 
 
 
 
...
Preview 4 out of 50 pages
Add to cartWhat are the 4 characteristics of cloud computing? 
Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
 
 
 
What NIST publication number defines cloud computing? 
800-145 
 
 
 
 
What ISO/IEC standard provides information on cloud computing? 
17788 
 
 
 
...
lasticity 
This is the flexibility of allocating resources as needed for immediate usage, instead of purchasing resources according to other variables 
 
 
 
Simplicity 
Usage and administration of cloud services ought to be transparent to cloud customers and users; from their perspective, a digital...
Preview 4 out of 35 pages
Add to cartlasticity 
This is the flexibility of allocating resources as needed for immediate usage, instead of purchasing resources according to other variables 
 
 
 
Simplicity 
Usage and administration of cloud services ought to be transparent to cloud customers and users; from their perspective, a digital...
Cloud Bursting 
When a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes. 
 
 
 
No; under current laws, liability and ri...
Preview 4 out of 62 pages
Add to cartCloud Bursting 
When a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes. 
 
 
 
No; under current laws, liability and ri...
_____ drive security decisions. 
business requirements 
 
 
All of these are reasons because of which an organization may want to consider cloud migration, except: 
Elimination of risks 
 
 
 
 
 
The generally accepted definition of cloud computing includes all of the following characteristics exce...
Preview 4 out of 31 pages
Add to cart_____ drive security decisions. 
business requirements 
 
 
All of these are reasons because of which an organization may want to consider cloud migration, except: 
Elimination of risks 
 
 
 
 
 
The generally accepted definition of cloud computing includes all of the following characteristics exce...
Broad network access 
There should never be network bandwidth bottlenecks. 
 
 
 
On-demand services 
Refers to the model that allows customers to scale their compute and/or storage needs with little or no intervention from or prior communication with the provider. 
 
 
 
 
Resource pooling 
Charact...
Preview 2 out of 7 pages
Add to cartBroad network access 
There should never be network bandwidth bottlenecks. 
 
 
 
On-demand services 
Refers to the model that allows customers to scale their compute and/or storage needs with little or no intervention from or prior communication with the provider. 
 
 
 
 
Resource pooling 
Charact...
In the cloud motif, the data owner is usually: 
 
A The cloud provider 
B The cloud customer 
C In another jurisdiction 
D The cloud access security broker 
The cloud customer 
 
 
 
What is the intellectual property protection for the logo of a new video game? 
 
A Copyright 
B Trade secret 
C Trad...
Preview 2 out of 6 pages
Add to cartIn the cloud motif, the data owner is usually: 
 
A The cloud provider 
B The cloud customer 
C In another jurisdiction 
D The cloud access security broker 
The cloud customer 
 
 
 
What is the intellectual property protection for the logo of a new video game? 
 
A Copyright 
B Trade secret 
C Trad...
ISO/IEC 27037:2012 
Guide for collecting, identifying, and preserving electronic evidence. 
 
 
 
ISO/IEC 27041:2015 
Guide for incident investigations 
 
 
 
 
 
 
ISO/IEC 27042:2015 
Guide for digital evidence analysis 
 
 
 
ISO/IEC 27043:2015 
Incident investigation principles and processes 
 
 ...
Preview 1 out of 2 pages
Add to cartISO/IEC 27037:2012 
Guide for collecting, identifying, and preserving electronic evidence. 
 
 
 
ISO/IEC 27041:2015 
Guide for incident investigations 
 
 
 
 
 
 
ISO/IEC 27042:2015 
Guide for digital evidence analysis 
 
 
 
ISO/IEC 27043:2015 
Incident investigation principles and processes 
 
 ...
Tort Law 
refers to the body of rights, obligations, and remedies that set out reliefs for persons who have been harmed as a result of wrongful acts by others. Civil case. 
 
 
 
Doctrine of the Proper law 
is a term used to deceive the processes associated with determining what legal jurisdiction w...
Preview 2 out of 9 pages
Add to cartTort Law 
refers to the body of rights, obligations, and remedies that set out reliefs for persons who have been harmed as a result of wrongful acts by others. Civil case. 
 
 
 
Doctrine of the Proper law 
is a term used to deceive the processes associated with determining what legal jurisdiction w...
NIST 500-292 
Cloud Computing Security Reference Architecture 
 
 
 
NIST 500-299 
Security Reference Architecture 
 
 
 
 
NIST 800-037 
Risk Management Frameworks 
 
 
 
NIST 800-053 
Privacy Control 
 
 
 
NIST 800-057 
Encryption 
 
 
 
NIST 800-061 
Incident Handling Guide 
 
 
 
NIST 800-064 
...
Preview 1 out of 3 pages
Add to cartNIST 500-292 
Cloud Computing Security Reference Architecture 
 
 
 
NIST 500-299 
Security Reference Architecture 
 
 
 
 
NIST 800-037 
Risk Management Frameworks 
 
 
 
NIST 800-053 
Privacy Control 
 
 
 
NIST 800-057 
Encryption 
 
 
 
NIST 800-061 
Incident Handling Guide 
 
 
 
NIST 800-064 
...
Eucalyptus 
Open source cloud computing and IaaS platform for enabling private clouds 
 
 
 
Apache Cloud Stack 
Open source cloud computing and IaaS platform developed to help make creating, deploying, and managing cloud services easier by providing a complete "stack" of features and components f...
Preview 2 out of 11 pages
Add to cartEucalyptus 
Open source cloud computing and IaaS platform for enabling private clouds 
 
 
 
Apache Cloud Stack 
Open source cloud computing and IaaS platform developed to help make creating, deploying, and managing cloud services easier by providing a complete "stack" of features and components f...
You are the security subject matter expert (SME) for an organization considering a transition from the legacy environment into a hosted cloud provider 's data center. One of the challenges you 're facing is whether the cloud provider will be able to comply with the existing legislative and contrac...
Preview 4 out of 38 pages
Add to cartYou are the security subject matter expert (SME) for an organization considering a transition from the legacy environment into a hosted cloud provider 's data center. One of the challenges you 're facing is whether the cloud provider will be able to comply with the existing legislative and contrac...
(ISC)2 - International Information System Security Certification Consortium 
A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry. 
 
 
(ISC)2 Cloud...
Preview 2 out of 13 pages
Add to cart(ISC)2 - International Information System Security Certification Consortium 
A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry. 
 
 
(ISC)2 Cloud...
encrypted 
Data created by the user should do this before uploading to the cloud. 
 
 
Public Key Infrastructure 
Dealing with keys and managing them 
 
 
 
 
 
PKI 
Framework of programs, procedures, communication protocols, and public key cryptography that enables a diverse group of individuals to...
Preview 1 out of 1 pages
Add to cartencrypted 
Data created by the user should do this before uploading to the cloud. 
 
 
Public Key Infrastructure 
Dealing with keys and managing them 
 
 
 
 
 
PKI 
Framework of programs, procedures, communication protocols, and public key cryptography that enables a diverse group of individuals to...
It is the phase for short-term storage when planning security controls for the data. 
False 
 
 
 
Archive phase activities in the cloud will largely be driven by whether a user is using the same cloud provider for backups and its production environment. 
True 
 
 
 
 
The physical security of the d...
Preview 2 out of 9 pages
Add to cartIt is the phase for short-term storage when planning security controls for the data. 
False 
 
 
 
Archive phase activities in the cloud will largely be driven by whether a user is using the same cloud provider for backups and its production environment. 
True 
 
 
 
 
The physical security of the d...
The risks and responsibilities will be shared between the cloud provider and customer. 
True 
 
 
 
The customer is concerned with data, whereas the provider is concerned with security and operation. 
True 
 
 
 
 
The customer wants to refute control, deny insight, and refrain from disclosing any i...
Preview 2 out of 13 pages
Add to cartThe risks and responsibilities will be shared between the cloud provider and customer. 
True 
 
 
 
The customer is concerned with data, whereas the provider is concerned with security and operation. 
True 
 
 
 
 
The customer wants to refute control, deny insight, and refrain from disclosing any i...
NIST 800-53 
Security and Privacy Contols for Information Systems and Organizations 
 
 
 
NIST 500-292 
Cloud Computing Reference Architecture 
 
 
 
 
NIST 800-37 
Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach 
 
 
 
NIST 800-57 
Re...
Preview 1 out of 3 pages
Add to cartNIST 800-53 
Security and Privacy Contols for Information Systems and Organizations 
 
 
 
NIST 500-292 
Cloud Computing Reference Architecture 
 
 
 
 
NIST 800-37 
Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach 
 
 
 
NIST 800-57 
Re...
International Traffic in Arms Regulation (ITAR) 
USA - state dept prohibitions on defense related exports. This can include cryptographic systems. 
 
 
 
Export Administration Regulations 
Department of Commerce 
 
Control: dual-use goods/software/technology predominately civilian in nature but may ...
Preview 2 out of 7 pages
Add to cartInternational Traffic in Arms Regulation (ITAR) 
USA - state dept prohibitions on defense related exports. This can include cryptographic systems. 
 
 
 
Export Administration Regulations 
Department of Commerce 
 
Control: dual-use goods/software/technology predominately civilian in nature but may ...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller FREEMANSHARP. Stuvia facilitates payment to the seller.
No, you only buy these notes for $39.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
67866 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now