As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?
An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?
An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?
A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?
Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?
An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?
Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?
Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?
Which term describes data elements that, when combined with other information, are used to single out an individual?
An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?