Which aspect of cloud computing will be most negatively impacted by vendor lock-in?

Which aspect of cloud computing will be most negatively impacted by vendor lock-in?A . ElasticityB . ReversibilityC . InteroperabilityD . PortabilityView AnswerAnswer: D Explanation: A cloud customer utilizing proprietary APIs or services from one cloud provider that are unlikely to be available from another cloud provider will most negatively impact...

June 24, 2019 No Comments READ MORE +

Within a federated identity system, which entity accepts tokens from the identity provider?

Within a federated identity system, which entity accepts tokens from the identity provider?A . Assertion managerB . Servicing partyC . Proxy partyD . Relying partyView AnswerAnswer: D Explanation: The relying party is attached to the application or service that a user is trying to access, and it accepts authentication tokens...

June 24, 2019 No Comments READ MORE +

Where is an XML firewall most commonly and effectively deployed in the environment?

Where is an XML firewall most commonly and effectively deployed in the environment?A . Between the application and data layersB . Between the presentation and application layersC . Between the IPS and firewallD . Between the firewall and application serverView AnswerAnswer: D Explanation: An XML firewall is most commonly deployed...

June 24, 2019 No Comments READ MORE +

What is the data encapsulation used with the SOAP protocol referred to as?

When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service. What is the data encapsulation used with the SOAP protocol referred to as?A . PacketB . PayloadC . ObjectD . EnvelopeView AnswerAnswer: D Explanation: Simple Object Access Protocol (SOAP) encapsulates...

June 24, 2019 No Comments READ MORE +

What is the biggest advantage to leasing space in a data center versus procuring cloud services?

A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it's best to lease space in a data center or build your own data center--and now with cloud computing, whether to purchase resources within...

June 23, 2019 No Comments READ MORE +

In what year did it go into effect?

The European Union passed the first major regulation declaring data privacy to be a human right. In what year did it go into effect?A . 2010B . 2000C . 1995D . 1990View AnswerAnswer: C Explanation: Adopted in 1995, Directive 95/46 EC establishes strong data protection and policy requirements, including the...

June 22, 2019 No Comments READ MORE +

Which term relates to the application of scientific methods and practices to evidence?

Which term relates to the application of scientific methods and practices to evidence?A . ForensicsB . MethodicalC . TheoreticalD . MeasuredView AnswerAnswer: A Explanation: Forensics is the application of scientific and methodical processes to identify, collect, preserve, analyze, and summarize/report digital information and evidence.

June 22, 2019 No Comments READ MORE +

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?

Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster?A . Broad network accessB . InteroperabilityC . Resource poolingD . PortabilityView AnswerAnswer: A Explanation: With...

June 22, 2019 No Comments READ MORE +

Within an Infrastructure as a Service model, which of the following would NOT be a measured service?

Within an Infrastructure as a Service model, which of the following would NOT be a measured service?A . CPUB . StorageC . Number of usersD . MemoryView AnswerAnswer: C Explanation: Within IaaS, the number of users on a system is not relevant to the particular hosting model in regard to...

June 22, 2019 No Comments READ MORE +

Which of the following is NOT part of a retention policy?

Which of the following is NOT part of a retention policy?A . FormatB . CostsC . AccessibilityD . DurationView AnswerAnswer: B Explanation: The data retention policy covers the duration, format, technologies, protection, and accessibility of archives, but does not address the specific costs of its implementation and maintenance.

June 22, 2019 No Comments READ MORE +