Topic 2, Exam Pool B
Which key storage solution would be the BEST choice in a situation where availability
might be of a particular concern?
Response:
A.
Internal
B.
External
C.
Hosted
D.
Embedded
Internal
Which of the following is not typically included in the list of critical assets specified for
continuity during BCDR contingency operations?
Response:
A.
Systems
B.
Data
C.
Cash
D.
Personnel
Cash
Which type of testing tends to produce the best and most comprehensive results for
discovering system vulnerabilities?
Response:
A.
Static
B.
Dynamic
C.
Pen
D.
Vulnerability
Static
A bare-metal hypervisor is Type ____________.
Response:
A.
1
B.
2
C.
3
D.
4
1
What are SOCI/SOCII/SOCIII?
Response:
A.
Risk management frameworks
B.
Access controls
C.
Audit reports
D.
Software development phases
Audit reports
The destruction of a cloud customer’s data can be required by all of the following except
___________.
Response:
A.
Statute
B.
Regulation
C.
The cloud provider’s policy
D.
Contract
The cloud provider’s policy
Federation should be __________ to the users.
Response:
A.
Hostile
B.
Proportional
C.
Transparent
D.
Expensive
Transparent
What is a cloud storage architecture that manages the data in a hierarchy of files?
Response:
A.
Object-based storage
B.
File-based storage
C.
Database
D.
CDN
File-based storage
You have been tasked by management to offload processing and validation of incoming
encoded data from your application servers and their associated APIs. Which of the
following would be the most appropriate device or software to consider?Response:
A.
XML accelerator
B.
XML firewall
C.
Web application firewall
D.
Firewall
XML accelerator
What is the most secure form of code testing and review?
Response:
A.
Open source
B.
Proprietary/internal
C.
Neither open source nor proprietary
D.
Combination of open source and proprietary
Combination of open source and proprietary
Page 18 out of 52 Pages |
Previous |