Topic 1: Exam Pool A
Who will determine data classifications for the cloud customer?
A.
The cloud provider
B.
NIST
C.
Regulators
D.
The cloud customer
The cloud customer
_______ is the most prevalent protocol used in identity federation.
A.
HTTP
B.
SAML
C.
FTP
D.
WS-Federation
SAML
Which cloud storage type uses an opaque value or descriptor to categorize and organize
data?
Response:
A.
Volume
B.
Object
C.
Structured
D.
Unstructured
Unstructured
What does nonrepudiation mean?
Response:
A.
Prohibiting certain parties from a private conversation
B.
Ensuring that a transaction is completed before saving the results
C.
Ensuring that someone cannot turn off auditing capabilities while performing a function
D.
Preventing any party that participates in a transaction from claiming that it did not
Preventing any party that participates in a transaction from claiming that it did not
Which of the following data sanitation methods would be the MOST effective if you needed
to securely remove data as quickly as possible in a cloud environment?
Response:
A.
Zeroing
B.
Cryptographic erasure
C.
Overwriting
D.
Degaussing
Cryptographic erasure
Which of the following is the recommended operating range for temperature and
humidity in a data center?
Response:
A.
Between 62 °F - 81 °F and 40% and 65% relative humidity
B.
Between 64 °F - 81 °F and 40% and 60% relative humidity
C.
Between 64 °F - 84 °F and 30% and 60% relative humidity
D.
Between 60 °F - 85 °F and 40% and 60% relative humidity
Between 64 °F - 81 °F and 40% and 60% relative humidity
A honeypot should contain _________ data.
Response:
A.
Raw
B.
Production
C.
Useless
D.
Sensitive
Useless
When an organization considers cloud migrations, the organization’s software
developers will need to know which _______ and _______ which the organization will
be using, in order to properly and securely create suitable applications.
A.
Geographic location, native language
B.
Legal restrictions, specific ISP
C.
Service model, deployment model
D.
Available bandwidth, telecommunications country code
Service model, deployment model
What type of device is often leveraged to assist legacy applications that may not
have the programmatic capability to process assertions from modern web services?
A.
Web application firewall
B.
XML accelerator
C.
Relying party
D.
XML firewall
XML accelerator
Which of the following management risks can make an organization’s cloud
environment unviable?
Response:
A.
Insider trading
B.
VM sprawl
C.
Hostile takeover
D.
Improper personnel selection
VM sprawl
Page 7 out of 52 Pages |
Previous |