Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?

Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?A . On-demand self-serviceB . Resource poolingC . Measured serviceD . Rapid elasticityView AnswerAnswer: D Explanation: Rapid elasticity allows a cloud environment to automatically add or remove resources...

July 25, 2019 No Comments READ MORE +

Which of the following is the optimal humidity level for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?

Which of the following is the optimal humidity level for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?A . 30-50 percent relative humidityB . 50-75 percent relative humidityC . 20-40 percent relative humidityD . 40-60 percent relative humidityView AnswerAnswer:...

July 25, 2019 No Comments READ MORE +

Which value refers to the amount of data an organization would need to recover in the event of a BCDR situation in order to reach an acceptable level of operations?

Which value refers to the amount of data an organization would need to recover in the event of a BCDR situation in order to reach an acceptable level of operations?A . SREB . RTOC . RPOD . RSLView AnswerAnswer: C Explanation: The recovery point objective (RPO) is defined as the...

July 25, 2019 No Comments READ MORE +

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?A . Dedicated switchesB . Trust zonesC . Redundant network circuitsD . Direct connectionsView AnswerAnswer: B Explanation: Trust zones can be implemented to separate systems or tiers along...

July 24, 2019 No Comments READ MORE +

Which United States law is focused on data related to health records and privacy?

Which United States law is focused on data related to health records and privacy?A . Safe HarborB . SOXC . GLBAD . HIPAAView AnswerAnswer: D Explanation: The Health Insurance Portability and Accountability Act (HIPAA) requires the U.S. Federal Department of Health and Human Services to publish and enforce regulations pertaining...

July 24, 2019 No Comments READ MORE +

Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?

Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?A . Security misconfigurationB . Insecure direct object referencesC . Unvalidated redirects and forwardsD . Sensitive data exposureView AnswerAnswer: A Explanation: Security misconfigurations occur when applications and systems are not properly...

July 24, 2019 No Comments READ MORE +

Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?

Which security concept is based on preventing unauthorized access to data while also ensuring that it is accessible to those authorized to use it?A . IntegrityB . AvailabilityC . ConfidentialityD . NonrepudiationView AnswerAnswer: C Explanation: The main goal of confidentiality is to ensure that sensitive information is not made available...

July 24, 2019 No Comments READ MORE +

Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?

Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used?A . PlatformB . InfrastructureC . GovernanceD . ApplicationView AnswerAnswer: C Explanation: Regardless of which cloud-hosting model is used, the cloud customer always has sole responsibility for the governance of systems and...

July 24, 2019 No Comments READ MORE +

Which type of audit report is considered a "restricted use" report for its intended audience?

Which type of audit report is considered a "restricted use" report for its intended audience?A . SAS-70B . SSAE-16C . SOC Type 1D . SOC Type 2View AnswerAnswer: C Explanation: SOC Type 1 reports are considered "restricted use" reports. They are intended for management and stakeholders of an organization, clients...

July 24, 2019 No Comments READ MORE +

Which cloud deployment model would be ideal for a group of universities looking to work together, where each university can gain benefits according to its specific needs?

Which cloud deployment model would be ideal for a group of universities looking to work together, where each university can gain benefits according to its specific needs?A . PrivateB . PublicC . HybridD . CommunityView AnswerAnswer: D Explanation: A community cloud is owned and maintained by similar organizations working toward...

July 24, 2019 No Comments READ MORE +