Question 61: Data _________ is the process of sorting through large data sets to identify patterns and establish relationships.
Question 62: Neo4j is a NoSQL graph database management system with more than 400 commercial customers, including Cisco, eBay and LinkedIn. What does NoSQL stand for?
A. no structured query language
B. not only structured query language
Question 63: Microsoft Office ____________ is a back-end tool in Office 365 that maps connections among employees, how often they collaborate and their use of Office 10 software tools.
Question 64: What is a shared responsibility model?
A. a framework that dictates the security obligations of both a cloud provider and its customers.
B. a tool for focusing discussion about cloud security and creating a roadmap for next steps.
Question 65: A cloud provider API allows the end user to interact with a cloud provider’s service. What does API stand for?
Question 66: The allocation of a cloud provider’s resources and services to a specific cloud customer is called _______________.
Question 67: What do you call the amount of time that a cloud provider’s systems and services are up and accessible by end users?
Question 68: A cloud access security broker (CASB) is a ___________ that allows an organization to extend the reach of its internal security policies.
Question 69: ________________ is the process of identifying, assessing and controlling threats to an organization’s capital and earnings.
Question 70: What do you call a mandatory business practice that an organization follows to minimize risk?
A. internal control
B. compliance burden
Question 71: What is a risk profile?
A. it’s a quantitative analysis of the types of threats an organization faces.
B. It’s the level of risk an organization is prepared to accept.
Question 72: A CRO is a corporate executive tasked with assessing and mitigating competitive, regulatory and technological threats to an enterprise’s capital and earnings. What does CRO stand for?
A. corporate regulatory official
B. chief risk officer
Question 73: KRI is a metric for measuring the likelihood that the combined probability of an event (and its consequence) will have a profoundly negative impact on an organization’s ability to be successful. What does KRI stand for?
Question 74: If you are caught distributing _____________, you can be arrested for financial extortion.
Question 75: What is the dark web?
A. an encrypted portion of the internet that is not indexed by search engines
B. a family of web browsers designed for anonymous web surfing
Question 76: What do you call encryption at the hardware level?
A. full-disk encryption
B. homomorphic encryption
Question 77: Digital ransoms are often paid through Bitcoin. What is Bitcoin?
A. a digital currency not backed by any country’s central bank or government
B. a computer program that controls the transfer of digital currencies between parties
Question 78: A low-code/no-code development platform is a visual IDE that allows ordinary people to drag and drop software modules and connect them together. What does IDE stand for?
A. integrated development environment
B. inept developer’s ecosystem
Question 79: What do you call the technique or methodology that, through experience and research, has proven to reliably lead to a desired result?
Question 80: ITIL is a framework designed to standardize the selection, planning, delivery and maintenance of IT services within a business. What does ITIL stand for?
A. Information Technology Iterative Listserve
B. Information Technology Infrastructure Library