Question 61: Data _________ is the process of sorting through large data sets to identify patterns and establish relationships.
Correct Answer: B. mining
Question 62: Neo4j is a NoSQL graph database management system with more than 400 commercial customers, including Cisco, eBay and LinkedIn. What does NoSQL stand for?
A. no structured query language
B. not only structured query language
Correct Answer: B. not only structured query language
Question 63: Microsoft Office ____________ is a back-end tool in Office 365 that maps connections among employees, how often they collaborate and their use of Office 10 software tools.
Correct Answer: B. Graph
Question 64: What is a shared responsibility model?
A. a framework that dictates the security obligations of both a cloud provider and its customers.
B. a tool for focusing discussion about cloud security and creating a roadmap for next steps.Correct Answer: A. a framework that dictates the security obligations of both a cloud provider and its customers.
Question 65: A cloud provider API allows the end user to interact with a cloud provider’s service. What does API stand for?
Correct Answer: application programming interface
Question 66: The allocation of a cloud provider’s resources and services to a specific cloud customer is called _______________.
B. provisioningCorrect Answer: B. provisioning
Question 67: What do you call the amount of time that a cloud provider’s systems and services are up and accessible by end users?
B. uptimeCorrect Answer: B. uptime
Question 68: A cloud access security broker (CASB) is a ___________ that allows an organization to extend the reach of its internal security policies.
Correct Answer: A. gatekeeper
Question 69: ________________ is the process of identifying, assessing and controlling threats to an organization’s capital and earnings.
Correct Answer: risk management
Question 70: What do you call a mandatory business practice that an organization follows to minimize risk?
A. internal control
B. compliance burden
Correct Answer: A. internal control
Question 71: What is a risk profile?
A. it’s a quantitative analysis of the types of threats an organization faces.
B. It’s the level of risk an organization is prepared to accept.
Correct Answer: A. it’s a quantitative analysis of the types of threats an organization faces.
Question 72: A CRO is a corporate executive tasked with assessing and mitigating competitive, regulatory and technological threats to an enterprise’s capital and earnings. What does CRO stand for?
A. corporate regulatory official
B. chief risk officer
Correct Answer: B. chief risk officer
Question 73: KRI is a metric for measuring the likelihood that the combined probability of an event (and its consequence) will have a profoundly negative impact on an organization’s ability to be successful. What does KRI stand for?
Correct Answer: Key risk indicator
Question 74: If you are caught distributing _____________, you can be arrested for financial extortion.
Correct Answer: B. ransomware
Question 75: What is the dark web?
A. an encrypted portion of the internet that is not indexed by search engines
B. a family of web browsers designed for anonymous web surfing
Correct Answer: A. an encrypted portion of the internet that is not indexed by search engines
Question 76: What do you call encryption at the hardware level?
A. full-disk encryption
B. homomorphic encryption
Correct Answer: A. full-disk encryption
Question 77: Digital ransoms are often paid through Bitcoin. What is Bitcoin?
A. a digital currency not backed by any country’s central bank or government
B. a computer program that controls the transfer of digital currencies between parties
Correct Answer: A. a digital currency not backed by any country’s central bank or government
Question 78: A low-code/no-code development platform is a visual IDE that allows ordinary people to drag and drop software modules and connect them together. What does IDE stand for?
A. integrated development environment
B. inept developer’s ecosystem
Correct Answer: A. integrated development environment
Question 79: What do you call the technique or methodology that, through experience and research, has proven to reliably lead to a desired result?
Correct Answer: best practice
Question 80: ITIL is a framework designed to standardize the selection, planning, delivery and maintenance of IT services within a business. What does ITIL stand for?
A. Information Technology Iterative Listserve
B. Information Technology Infrastructure Library
Correct Answer: B. Information Technology Infrastructure Library