Under EU law, a cloud customer who gives sensitive data to a cloud provider is still legally responsible for the damages resulting from a data breach caused by the provider; the EU would say that it is the cloud customer’s fault for choosing the wrong provider.
This is an example of insufficient ______ .
Proof
Evidence
Due diligence
Application of reasonableness
Correct answer: C
Question 2
What is the term that describes the situation when a malicious user/attacker can exit the restrictions of a single host and access other nodes on the network?
Response:
Host escape
Guest escape
Provider exit
Escalation of privileges
Correct answer: A
Question 3
According to the (ISC)2 Cloud Secure Data Life Cycle, which phase comes soon after (or at the same time as) the Create phase?