What does it mean if the system or environment is built automatically from a template?
Answer : D
When designing an encryption system, you should start with a threat model.
Answer : B
When mapping functions to lifecycle phases, which functions are required to successfully process data?
Answer : A
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
Answer : C
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
Answer : C
Which of the following statements is true in regards to Data Loss Prevention (DLP)?
Answer : E
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
Answer : B