What controls the formatting and security settings of a volume storage system within a cloud environment?

What controls the formatting and security settings of a volume storage system within a cloud environment?A . Management planeB . SAN host controllerC . HypervisorD . Operating system of the hostView AnswerAnswer: D Explanation: Once a storage LUN is allocated to a virtual machine, the operating system of that virtual...

July 10, 2019 No Comments READ MORE +

Which of the following is NOT a package that can be used for implementing and maintaining baselines across an enterprise?

Implementing baselines on systems would take an enormous amount of time and resources if the staff had to apply them to each server, and over time, it would be almost impossible to keep all the systems in sync on an ongoing basis. Which of the following is NOT a package...

July 10, 2019 No Comments READ MORE +

Which approach is typically the most efficient method to use for data discovery?

Which approach is typically the most efficient method to use for data discovery?A . MetadataB . Content analysisC . LabelsD . ACLsView AnswerAnswer: A Explanation: Metadata is data about data. It contains information about the type of data, how it is stored and organized, or information about its creation and...

July 10, 2019 No Comments READ MORE +

What type of data does data rights management (DRM) protect?

What type of data does data rights management (DRM) protect?A . ConsumerB . PIIC . FinancialD . HealthcareView AnswerAnswer: A Explanation: DRM applies to the protection of consumer media, such as music, publications, video, movies, and soon.

July 10, 2019 No Comments READ MORE +

Which of the following is the biggest concern or challenge with using encryption?

Which of the following is the biggest concern or challenge with using encryption?A . Dependence on keysB . Cipher strengthC . EfficiencyD . Protocol standardsView AnswerAnswer: A Explanation: No matter what kind of application, system, or hosting model used, encryption is 100 percent dependent on encryption keys. Properly securing the...

July 9, 2019 No Comments READ MORE +

Which of the following is NOT a factor that is part of a firewall configuration?

Which of the following is NOT a factor that is part of a firewall configuration?A . EncryptionB . PortC . ProtocolD . Source IPView AnswerAnswer: A Explanation: Firewalls take into account source IP, destination IP, the port the traffic is using, as well as the network protocol (UDP/TCP). Whether or...

July 9, 2019 No Comments READ MORE +

Which protocol does the REST API depend on?

Which protocol does the REST API depend on?A . HTTPB . XMLC . SAMLD . SSHView AnswerAnswer: A Explanation: Representational State Transfer (REST) is a software architectural scheme that applies the components, connectors, and data conduits for many web applications used on the Internet. It uses and relies on the...

July 9, 2019 No Comments READ MORE +

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?

Which of the following does NOT fall under the "IT" aspect of quality of service (QoS)?A . ApplicationsB . Key performance indicators (KPIs)C . ServicesD . SecurityView AnswerAnswer: B Explanation: KPIs fall under the "business" aspect of QoS, along with monitoring and measuring of events and business processes. Services, security,...

July 9, 2019 No Comments READ MORE +

Which of the cloud deployment models would you MOST likely be exploring?

The president of your company has tasked you with implementing cloud services as the most efficient way of obtaining a robust disaster recovery configuration for your production services. Which of the cloud deployment models would you MOST likely be exploring?A . HybridB . PrivateC . CommunityD . PublicView AnswerAnswer: A...

July 9, 2019 No Comments READ MORE +

Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?

Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?A . VPNB . WAFC . IPSecD . HTTPSView AnswerAnswer: A Explanation: Virtual private networks (VPNs) are commonly used to allow access into trust zones. Via a VPN, access can be controlled...

July 8, 2019 No Comments READ MORE +