Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
Correct Answer:
E
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud assessment toolkit that does not map any existing standards.
Correct Answer:
B
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
Correct Answer:
B
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
Correct Answer:
A
Which concept is a mapping of an identity, including roles, personas, and attributes, to an authorization?
Correct Answer:
D