Which group should be notified for approval when a planned modification to an environment is scheduled?
Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?
Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?
Which security concept requires continuous identity and authorization checks to allow access to data?
An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?
During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?
An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?
Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?
After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?
Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?
After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?
Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?
An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?
Which cloud computing service model allows customers to run their own application code without configuring the server environment?
An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?
Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?