Chapter 3: Security in the Cloud
B. The Platform as a Service model offers operating system security provided by the service provider.
B, C. Logging into a system is referred to as authentication, and the use of a token to log in describes two-factor authentication.
C. The question outlines the function of a role-based access control approach.
C. Service Organization Controls 3 reports are for public disclosure of financial controls and security reporting.
B. The National Institute of Standards and Technology (NIST) FIPS 140-2 publication coordinates the requirements and standards for cryptography modules.
B. The Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) is the process for computer systems IT security. DIACAP compliance is required to be certified to meet the U.S. Department of Defense security requirements for contractors.
B. The Health Insurance Portability and Accountability Act defines the standards for protecting medical...