CCM: The following list of controls belong to which domain of the CCM?
CCM: The following list of controls belong to which domain of the CCM? GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework A. Governance and Retention Management B. Governance and Risk […]
Which cloud-based service model enables companies to provide client-based access for partners to databases or
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications? A. Platform-as-a-service (PaaS) B. Desktop-as-a-service (DaaS) C. Infrastructure-as-a-service (IaaS) D. Identity-as-a-service (IDaaS) E. Software-as-a-service (SaaS)
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional fa
What factors should you understand about the data specifically due to legal, regulatory, and jurisdictional factors? A. The physical location of the data and how it is accessed B. The fragmentation and encryption algorithms employed C. The language of the data and how it affects the user D. The implications of storing complex information on […]
Who is responsible for the security of the physical infrastructure and virtualization platform?
Who is responsible for the security of the physical infrastructure and virtualization platform? A. The cloud consumer B. The majority is covered by the consumer C. It depends on the agreement D. The responsibility is split equally E. The cloud provider
CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy
CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk. A. Risk Impact B. Domain C. Control Specification
If there are gaps in network logging data, what can you do?
If there are gaps in network logging data, what can you do? A. Nothing. There are simply limitations around the data that can be logged in the cloud. B. Ask the cloud provider to open more ports. C. You can instrument the technology stack with your own logging. D. Ask the cloud provider to close […]
All cloud services utilize virtualization technologies.
All cloud services utilize virtualization technologies. A. False B. True
As a business analyst why would you ever want to prioritize requirements?
One of the processes within requirements analysis is to prioritize requirements. As a business analyst why would you ever want to prioritize requirements? A. You may need to determine the cost of each requirement. B. You may need to determine the schedule for each requirement. C. You may need to determine which requirements are most […]
What must happen in this instance before formal approval can be offered?
You are the business analyst for your organization. Gary and Janet, two key stakeholders in the project, are in disagreement over a requirement for the type of software to be installed on the server your solution calls for. What must happen in this instance before formal approval can be offered? A. The conflict will need […]
What business analysis process is Paul performing in this scenario?
Paul is the business analyst for his organization. He is examining a single solution to determine if the solution he and his team have identified carries enough business value to justify its implementation. What business analysis process is Paul performing in this scenario? A. Define transition requirements B. Assess proposed solution C. Assess organizational readiness […]