Topic 2, Exam Pool B
Although encryption can help an organization to effectively decrease the possibility of data
breaches, which other type of threat can it increase the chances of?
Response:
A.
Insecure interfaces
B.
Data loss
C.
System vulnerabilities
D.
Account hijacking
Data loss
What is a cloud storage architecture that manages the data in caches of copied content
close to locations of high demand?
Response:
A.
A. Object-based storage
B.
B. File-based storage
C.
Database
D.
CDN
CDN
Which of the following is a method for apportioning resources that involves setting
maximum usage amounts for all tenants/customers within the environment?
Response:
A.
Reservations
B.
Shares
C.
Cancellations
D.
Limits
Limits
There are two general types of smoke detectors. Which type uses a small portion of
radioactive material?
Response:
A.
Photoelectric
B.
Ionization
C.
Electron pulse
D.
Integral field
Ionization
You are the data manager for a retail company; you anticipate a much higher volume of
sales activity in the final quarter of each calendar year than the other quarters.
In order to handle these increased transactions, and to accommodate the temporary sales
personnel you will hire for only that time period, you consider augmenting your internal, onpremises
production environment with a cloud capability for a specific duration, and will
return to operating fully on-premises after the period of increased activity.
This is an example of ____________.
Response:
A.
Cloud framing
B.
Cloud enhancement
C.
Cloud fragility
D.
Cloud bursting
Cloud bursting
TLS provides and ________ for ________ communications.
Response:
A.
Privacy, security
B.
Security, optimization
C.
Privacy, integrity
D.
Enhancement, privacy
Privacy, integrity
Before deploying a specific brand of virtualization toolset, it is important to configure it
according to ____________.
Response:
A.
Industry standards
B.
Prevailing law of that jurisdiction
C.
Vendor guidance
D.
Expert opinion
Vendor guidance
Which cloud service category brings with it the most expensive startup costs, but also the
lowest costs for ongoing support and maintenance staff?
Response:
A.
IaaS
B.
SaaS
C.
PaaS
D.
DaaS
SaaS
Halon is now illegal to use for data center fire suppression. What is the reason it was
outlawed?
Response:
A.
It poses a threat to health and human safety when deployed.
B.
It can harm the environment.
C.
It does not adequately suppress fires.
D.
It causes undue damage to electronic systems.
It can harm the environment.
A process for __________ can aid in protecting against data disclosure due to lost devices.
Response:
A.
User punishment
B.
Credential revocation
C.
Law enforcement notification
D.
Device tracking
Credential revocation
Which of the following is not a feature of SAST?
Response:
A.
Source code review
B.
Team-building efforts
C.
“White-box” testing
D.
Highly skilled, often expensive outside consultants
Team-building efforts
Aside from the fact that the cloud customer probably cannot locate/reach the physical
storage assets of the cloud provider, and that wiping an entire storage space would impact
other customers, why would degaussing probably not be an effective means of secure
sanitization in the cloud?
Response:
A.
All the data storage space in the cloud is already gaussed.
B.
Cloud data storage may not be affected by degaussing.
C.
Federal law prohibits it in the United States.
D.
The blast radius is too wide.
Cloud data storage may not be affected by degaussing.
Page 18 out of 43 Pages |
Previous |