Results
You’re not ready,
Back to the Books
HD Quiz powered by harmonic design
#1. a service exposed by the provider, where the customer doesn’t manage any of the underlying hardware or virtual machines and simply accesses exposed function is known as a?
#2. In order to implement the Immutable Workloads approach you would need the following except.
#3. By placing an encryption proxy in a trusted area between the cloud user and the cloud provider you will ensure the data transfer is secure, True or False
#4. Compliance testing looks at the accuracy and integrity of transactions that go through processes and information systems. True or False
#5. When using immutable servers, you should disable remote access and integrate file integrity monitoring because nothing in the running instances should change. True or False.
#6. Data owners are expected to select the appropriate classification for a particular data set.
#7. Which of the following is NOT considered a part of Common Criteria?
#8. Data passes through an encryption proxy before being sent to the SaaS application is known as?
#9. Providers will usually encrypt all customer data at which level.
#10. Auto-scaling and failover are the two most important attributes that a virtual appliance should have in a cloud environment. True or False
#11. Access controls in the cloud should be implemented in all of the layers except.
#12. When it comes to IaaS and SaaS, who is primarily responsible for IAM?
#13. Fuzz Testing: Trying to generate an error code while the application is running is an example of?
#14. In which phase of the Data Lifecycle deploys an Access Controls list and Rights Management?
#15. In which cloud service models is the customer responsible for the client access endpoints.
#16. Which of the following is not a component of a Container.
#17. A dedicated network of storage devices. It is a combination of hardware and software that offers a block-level storage mechanism.
#18. IaaS volumes can be encrypted using different methods,except.
#19. You can implementing software agents in a serverless environment. True or False
#20. In order to create a logical drive on 100TB hard-drive and have it be identified as a separate drive what would you use?
#21. A point-in-time look at the design of the controls is known as?
#22. Vulnerability assessments (VAs) should always be performed on images before they are used to launch instance. True or False
#23. A bastion network can be defined as a network that data must go through in order to get to a destination, True or False
#24. Which of the following is incorrect as it pertains to SaaS cloud service responsibilities.
#25. In which phase of the Data Lifecycle does encryption at rest occur?
#26. Can be used to identify the virtual drives that can be accessed within a zone.
#27. Which Layer of the SAN does network devices include switches, routers, bridges, gateways, and even cables reside?
#28. The ability to move from one environment to another with minimal changes required is called.
#29. This classification approach inspects and interprets data looking for known sensitive data.
#30. The primary security responsibilities of the cloud provider in compute virtualization are to enforce isolation and maintain a secure virtualization infrastructure. True or False.
#31. Since volatile memory can hold a lot of sensitive data, who is responsible for securing or isolating this data from the environment.
#32. Private cloud governance depends on who owns and operates the private cloud: If you outsource a private cloud, governance changes. True or False
#33. An architectural concept that enables centralized management and emphasizes the role of software in running networks to dynamically control, change, and manage network behavior.
#34. Creating a bastion network and forcing all cloud traffic through it can act as a chokepoint. True or False
#35. Three layers of a SAN include all except.