Topic 2, Exam Pool B
In a Lightweight Directory Access Protocol (LDAP) environment, each entry in a directory
server is identified by a ___________.
Response:
A.
Domain name (DN)
B.
Distinguished name (DN)
C.
Directory name (DN)
D.
Default name (DN)
Distinguished name (DN)
Which type of report is considered for “general” use and does not contain any sensitive
information?
Response:
A.
SOC 1
B.
SAS-70
C.
SOC 3
D.
SOC 2
SOC 3
What aspect of data center planning occurs first?
Response:
A.
Logical design
B.
Physical design
C.
Audit
D.
Policy revision
Physical design
From a security perspective, automation of configuration aids in ____________.
Response:
A.
From a security perspective, automation of configuration aids in ____________.
Response:
B.
Enhancing performance
C.
Reducing potential attack vectors
D.
Increasing ease of use of the systems
E.
Reducing need for administrative personnel
Enhancing performance
What type of software is often considered secured and validated via community
knowledge?
Response:
A.
Proprietary
B.
Object-oriented
C.
Open source
D.
Scripting
Open source
What could be the result of failure of the cloud provider to secure the hypervisor in such a
way that one user on a virtual machine can see the resource calls of another user’s virtual
machine?
Response:
A.
Unauthorized data disclosure
B.
Inference attacks
C.
Social engineering
D.
Physical intrusion
Inference attacks
Your organization is developing software for wide use by the public. You have decided to
test it in a cloud environment, in a PaaS model. Which of the following should be of
particular concern to your organization for this situation?
Response:
A.
Vendor lock-in
B.
Backdoors
C.
Regulatory compliance
D.
High-speed network connectivity
Backdoors
Tokenization requires at least ____ database(s).
Response:
A.
One
B.
Two
C.
Three
D.
Four
Two
Which of the following is the correct name for Tier II of the Uptime Institute Data Center
Site Infrastructure Tier Standard Topology?
Response:
A.
Concurrently Maintainable Site Infrastructure
B.
Fault-Tolerant Site Infrastructure
C.
Basic Site Infrastructure
D.
Redundant Site Infrastructure Capacity Components
Redundant Site Infrastructure Capacity Components
You are the security manager of a small firm that has just purchased a DLP solution to
implement in your cloud-based production environment.
Which of these activities should you perform before deploying the tool?
Response:
A.
Survey your company’s departments about the data under their control
B.
Reconstruct your firewalls
C.
Harden all your routers
D.
Adjust the hypervisors
Survey your company’s departments about the data under their control
Page 15 out of 52 Pages |
Previous |