Which of the following is a compliance
standard?
a) PCI-DSS
b) HIPPA
c) GLBA
d) All of the mentioned

1 Answer

Answer :

All of the mentioned

Related questions

Description : _________ is used for merchant transactions under the Payment Card Industry Data Security Standard. a) ClearPoint PCI b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ClearPoint PCI

Description : Which of the following is a PCI CaaS service? a) FedCloud b) ClearSoln c) Rackserve PCI d) All of the mentioned

Last Answer : ) Rackserve PCI

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following is an example of a vertical cloud that advertise CaaS capabilities? a) FedCloud b) ClearPoint PCI c) Rackserve PCI d) All of the mentioned

Last Answer : CaaS

Description : Learn about HIPPA compliance rules?

Last Answer : form_title=Learn about HIPPA compliance rules form_header=Keep your business in check with HIPPA rules by hiring a consultant. Has your business ever been cited for non-compliance with HIPAA rules?= () Yes () No ... No Do you want to hire a consultant to help achieve HIPAA compliance?= () Yes () No

Description : Point out the correct statement. a) Cloud computing by its very nature spans same jurisdictions b) SaaS is much more than simply providing an anonymous service token to an identity c) A Compliance as a Service application would need to serve as a trusted third party d) All of the mentioned

Last Answer : A Compliance as a Service application would need to serve as a trusted third party

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : ________ captive requires that the cloud accommodate multiple compliance regimes. a) Licensed b) Policy-based c) Variable d) All of the mentioned

Last Answer : Policy-based

Description : Which of the following subject area deals with pay-as-you-go usage model? a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Accounting Management

Description : Which of the following is one of the most actively developing and important areas of cloud computing technology? a) Logging b) Auditing c) Regulatory compliance d) None of the mentioned

Last Answer : Regulatory compliance

Description : Point out the correct statement. a) The cloud service model you choose does not determine the variety of security features, compliance auditing, and other requirements b) To determine the particular ... you normally use for your applications only CSE-R17.BLOGSPOT.COM d) All of the mentioned

Last Answer : To determine the particular security mechanisms you need, you must perform a mapping of the particular cloud service model to the particular application you are deploying

Description : Which of the following area of cloud computing is uniquely troublesome? a) Auditing b) Data integrity c) e-Discovery for legal compliance d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following services that need to be negotiated in Service Level Agreements? a) Logging b) Auditingc) Regulatory compliance d) All of the mentioned

Last Answer : All of the mentioned

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : ________ as a Service is a hosted application that is the cloud equivalent of a traditional desktop application. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Software

Description : CaaS stands for _____________ as service. a) Compliance b) Computer c) Community d) Communication

Last Answer : Communication

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Which of the following operating system support operating system virtualization? A. Windows NT B. Sun Solaris C. Windows XP D. Compliance

Last Answer : Sun Solaris

Description : ________ as a Service is a development environment that builds upon an existing cloud computing application infrastructure. a) Software b) Platform c) Analytics d) Compliance

Last Answer : Platform

Description : Which of the following operating system support operating system virtualization? a) Windows NT b) Sun Solaris c) Windows XP d) Compliance

Last Answer : Sun Solaris

Description : .Which of the following operating system support operating system virtualization? a) Windows NT b) Sun Solaris c) Windows XP d) Compliance

Last Answer : Sun Solaris

Description : Which of the following standard is concerned with the exchange and control of identity information? a) IGK b) IDF c) IGF d) All of the mentioned

Last Answer : IGF

Description : Any software application that complies with the standard accepts a _______ that is authenticated by a trusted provider. a) OpenID b) OpenUser c) OpenSSD d) None of the mentioned

Last Answer : OpenID

Description : A _______ system uses components to assemble services that can be tailored for a specific purpose using standard parts. a) reliable b) scalable c) composable d) none of the mentioned

Last Answer : composable

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) A standard machine instance (virtual computer) might cost $0.10 or less an hour b) A typical storage charge might be $0.10 per GB/month c) Outsourcing shifts the burden of capital expenditures onto the service provider d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Which of the following is the standard for interoperable cloud-based key management? a) KMIP b) PMIK c) AIMK d) None of the mentioned

Last Answer : KMIP

Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned

Last Answer : lose the keys

Description : The standard for deploying web services on the Java EE platform as of Java EE 1.4:- a) JAX-RPC b) JAX c) RPC d) None of the mentioned

Last Answer : JAX-RPC

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following standard connect distributed hosts or tenants to their provisioned storage in the cloud? a) CDMI b) OCMI c) COA d) All of the mentioned

Last Answer : CDMI

Description : Which of the following is the most commonly used standard for performing synchronization? a) SyncML b) SMIL c) SML d) None of the mentioned

Last Answer : SyncML

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : If you put one of your family members down on the hippa form can they still find out if you ask the doctor not to?

Last Answer : Can you be more specific? What form? Is it her form, or yours? Did you indicate you didn’t want her to tell your mother any medical information?

Description : What are some Hippa technical safe guards?

Last Answer : Need answer

Description : When must A HIPPA breach be reported?

Last Answer : Within 24 hours of discovery.

Description : What is the full form of 'DSS' ? -How To ?

Last Answer : The full form of 'DSS' is Decision Support System

Description : what is the difference between model driven and data driven DSS?

Last Answer : Model data driven user interacts primarily with a mathematical model and its results while data driven DSS is user interacts primarily with the data

Description : What is the full form of DSS ?

Last Answer : DSS Full Decision Support System.

Description : What do you need to connect two Nintendo DS's?

Last Answer : You need a DS connect cable to mate them together and play multiplayer games.

Description : How can I get away from my mom who already physically abused me twice DSS has already been called 3x who can help?

Last Answer : I have a bruise from my mom multiple recordings of emotional abuse, she doesn't care about me, my relatives in SC already offered me to stay with them. She won't let me stay with them. DSS has done ... weren't bad enough. My mom will not allow it I have ten months until I turn 18. Help, please

Description : What are the advantages of Business Objects over other DSS?

Last Answer : User Friendly Familiar Business Terms Graphical Interface Enterprise wide Deployment of documents using WebI Drag and Drop Powerful reports in less time

Description : What does contractor compliance with the Electronic Industries Alliance Standard 748 (EIA-748) Earned Value Management System (EVMS) guidelines require?

Last Answer : Need answer

Description : Email is _________ A. Loss-tolerant application B. Bandwidth-sensitive application C. Elastic application D. None of the mentioned

Last Answer : C. Elastic application

Description : Which of the following network resources can be load balanced? a) Connections through intelligent switches b) DNS c) Storage resources d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : The technology used to distribute service requests to resources is referred to as _____________ a) load performing b) load scheduling c) load balancing d) all of the mentioned

Last Answer : load balancing

Description : Which of the following type of virtualization is also characteristic of cloud computing? a) Storage b) Application c) CPU d) All of the mentioned

Last Answer : All of the mentioned