Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?
An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?A . NetworkB . UsersC . MemoryD . CPUView AnswerAnswer: B Explanation: Dealing with...
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?A . Cryptographic erasureB . ZeroingC . OverwritingD . DeletionView AnswerAnswer: D Explanation: Deletion merely removes the pointers to data on a system; it does nothing to actually remove...
Which value refers to the percentage of production level restoration needed to meet BCDR objectives?
Which value refers to the percentage of production level restoration needed to meet BCDR objectives?A . RPOB . RTOC . RSLD . SREView AnswerAnswer: C Explanation: The recovery service level (RSL) is a percentage measure of the total typical production service level that needs to be restored to meet BCDR...
What is used for local, physical access to hardware within a data center?
What is used for local, physical access to hardware within a data center?A . SSHB . KVMC . VPND . RDPView AnswerAnswer: B Explanation: Local, physical access in a data center is done via KVM (keyboard, video, mouse) switches.
Which United States law is focused on PII as it relates to the financial industry?
Which United States law is focused on PII as it relates to the financial industry?A . HIPAAB . SOXC . Safe HarborD . GLBAView AnswerAnswer: D Explanation: The GLBA, as it is commonly called based on the lead sponsors and authors of the act, is officially known as "The Financial...
Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?
Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?A . InjectionB . Missing function-level access controlC . Cross-site request forgeryD . Cross-site scriptingView AnswerAnswer: B Explanation: It is imperative that an application perform checks when each function...
Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?
Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?A . PLANB . WANC . LAND . VLANView AnswerAnswer: D Explanation: A virtual area network (VLAN) allows the logical separation and isolation of networks and IP spaces to provide enhanced security and controls.
Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?
Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?A . Inter-cloud providerB . Cloud service business managerC . Cloud service administratorD . Cloud service integratorView AnswerAnswer: A Explanation: The inter-cloud provider is responsible for peering with other cloud...
Which of the following storage types is most closely associated with a traditional file system and tree structure?
Which of the following storage types is most closely associated with a traditional file system and tree structure?A . VolumeB . UnstructuredC . ObjectD . StructuredView AnswerAnswer: A Explanation: Volume storage works as a virtual hard drive that is attached to a virtual machine. The operating system sees the volume...
What does SDN stand for within a cloud environment?
What does SDN stand for within a cloud environment?A . Software-dynamic networkingB . Software-defined networkingC . Software-dependent networkingD . System-dynamic nodesView AnswerAnswer: B Explanation: Software-defined networking separates the administration of network filtering and network forwarding to allow for distributed administration.