Which of the following is not a risk management framework?
Answer : B
Hex GBL is a reference to a computer part in Terry Pratchett's fictional Discworld universe. The rest are not.
Which of the following is the best example of a key component of regulated PII?
Answer : D
Mandatory breach reporting is the best example of regulated PII components. The rest are generally considered components of contractual PII.
Which of the following is a valid risk management metric?
Answer : B
KRI stands for key risk indicator. KRIs are the red flags if you will in the world of risk management. When these change, they indicate something is amiss and should be looked at quickly to determine if the change is minor or indicative of something important.
What is the Cloud Security Alliance Cloud Controls Matrix (CCM)?
Answer : C
The CSA CCM is an inventory of cloud service security controls that are arranged into separate security domains, not a hierarchy.
Which of the following is the least challenging with regard to eDiscovery in the cloud?
Answer : C
Forensic analysis is the least challenging of the answers provided as it refers to the analysis of data once it is obtained. The challenges revolve around obtaining the data for analysis due to the complexities of international law, the decentralization of data storage or difficulty knowing where to look, and identifying the data owner, controller, and processor.
A UPS should have enough power to last how long?
Answer : C
Which of the following best describes the Organizational Normative Framework (ONF)?
Answer : D
Option B is incorrect, because it refers to a specific applications security elements, meaning it is about an ANF, not the ONF. C is true, but not as complete as D, making D the better choice. C suggests that the framework contains only ''some'' of the components, which is why B (which describes ''all'' components) is better