1. According to the Cloud Security Alliance (CSA), which of the following domains deals with privacy and regulatory requirements as well as security breach disclosure law? A. compliance and audit B. legal and electronic discovery C. data center operations D. virtualization
B. legal and electronic discovery
A. information lifecycle management
C. identity and access management
4. According to the Cloud Security Alliance (CSA), which of the following domains looks at the ability to move data/services from one provider to another. A. identity and access management B. encryption and key management C. application security D. portability and interoperability
D. portability and interoperability
D. All of the above.
B. Both customers and providers should develop robust governance if an
infrastructure as service (IaaS) model is being used.
With many cloud computing deployments, which of the following plays a large role in risk management? A. contract requirements B. service level agreements C. provider documentation D. all of the above
D. all of the above
8. Certain cloud service providers may restrict which of the following? A. penetration testing B. access to audit logs C. vulnerability assessments D. all of the above
D. all of the above
The risk management approach for organizations moving to the cloud should include all of the following, EXCEPT:
A. development of risk treatment plans with a universal response option
B. identification and analysis of threats and vulnerabilities
C. identification and valuation of assets
D. outcomes of risk treatment plans included in service agreements
A. development of risk treatment plans with a universal response option
Aligning exposure to risk and capability of managing it with the risk tolerance of the data owner is referred to as: A. information treatment planning B. information risk management C. information lifecycle management D. information development design
B. information risk management
The primary means of decision support for information technology resources is: A. information lifecycle management B. information risk management C. risk comparison management D. both A and B
B. information risk management
. Information risk decisions are informed by which of the following data? A. information usage B. security controls C. access controls D. all of the above
D. all of the above
When utilizing SaaS (software as a service), the majority of information is provided by: A. the user B. the service provider C. the organization D. the governance body
B. the service provider
14. Information transparency is built into the contact language when using: A. software as a service B. platform as a service C. infrastructure as a service D. both A and C
C. infrastructure as a service
15. The ability to deploy and gather information from controls is important when using: A. software as a service B. platform as a service C. infrastructure as a service D. all of the above
B. platform as a service
B. Assessments of third party service providers should only focus on incident
management, disaster recovery and business continuity processes.
17. A comprehensive analysis of legal issues related to cloud computing includes consideration of all the following dimensions, EXCEPT: A. contratual B. operational C. functional D. jurisdictional
B. operational
18. Which of the following legal dimensions involves determining the cloud functions/services have legal implications for stakeholders? A. obligational B. operational C. foundational D. functional
D. functional
19. Which of the following legal dimensions involves how governments administer laws/regulations that impact cloud computing stakeholders? A. jurisdictional B. legislational C. regulatory D. compliance
A. jurisdictional
20. Which of the following legal dimensions involves the contract structures and enforcement mechanisms for addressing/managing legal issues in cloud computing? A. jurisdictional B. compliance C. contractual D. documentation
C. contractual
21. Cloud computing is distinguishable from traditional outsourcing in: A. two ways B. three ways C. four ways D. more than four ways
B. three ways
C. anonymity of clients/users
B. technology professionals and lawyers
Which of the following is NOT a legal recommendation for cloud computing?
A. Data in the custody of service providers is under an indirect guardianship than when they are in the hands of their original owner.
B. Components of duty of care of a client include: pre-contract due diligence, contract term negotiation and post-contract monitoring.
C. Expected as well as unexpected terminations of relationship between client and service provider ought to be planned for.
D. Service providers should ensure that their information systems can preserve data as authentic and reliable.
A. Data in the custody of service providers is under an indirect guardianship than when they are in the hands of their original owner.