However, the SOAP API will only support which one of the following data formats?

Most APIs will support a variety of different data formats or structures. However, the SOAP API will only support which one of the following data formats?A . XMLB . XSLTC . JSOND . SAMLView AnswerAnswer: A Explanation: The Simple Object Access Protocol (SOAP) protocol only supports the Extensible Markup Language...

June 22, 2019 No Comments READ MORE +

Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?

Which value refers to the amount of time it takes to recover operations in a BCDR situation to meet management's objectives?A . RSLB . RPOC . SRED . RTOView AnswerAnswer: D Explanation: The recovery time objective (RTO) is a measure of the amount of time it would take to recover...

June 21, 2019 No Comments READ MORE +

Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?

Which entity requires all collection and storing of data on their citizens to be done on hardware that resides within their borders?A . RussiaB . FranceC . GermanyD . United StatesView AnswerAnswer: A Explanation: Signed into law and effective starting on September 1, 2015, Russian Law 526-FZ establishes that any...

June 21, 2019 No Comments READ MORE +

Which OSI layer does IPsec operate at?

Which OSI layer does IPsec operate at?A . NetworkB . transportC . ApplicationD . PresentationView AnswerAnswer: A Explanation: A major difference between IPsec and other protocols such as TLS is that IPsec operates at the Internet network layer rather than the application layer, allowing for complete end-to-end encryption of all...

June 21, 2019 No Comments READ MORE +

What concept does the "A" represent in the DREAD model?

What concept does the "A" represent in the DREAD model?A . Affected usersB . AuthenticationC . AffinityD . AuthorizationView AnswerAnswer: A Explanation: Affected users refers to the percentage of users who would be impacted by a successful exploit. Scoring ranges from 0, which means no users are impacted, to 10,...

June 20, 2019 No Comments READ MORE +

With a federated identity system, where would a user perform their authentication when requesting services or application access?

With a federated identity system, where would a user perform their authentication when requesting services or application access?A . Cloud providerB . The applicationC . Their home organizationD . Third-party authentication systemView AnswerAnswer: C Explanation: With a federated identity system, a user will perform authentication with their home organization, and...

June 20, 2019 No Comments READ MORE +

Which of the following is NOT a technology for securing data in transit?

Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud. Which of the following is NOT a technology for securing data in transit?A . VPNB . TLSC . DNSSECD . HTTPSView AnswerAnswer: C...

June 20, 2019 No Comments READ MORE +

Which of the following would be a reason to undertake a BCDR test?

Which of the following would be a reason to undertake a BCDR test?A . Functional change of the applicationB . Change in staffC . User interface overhaul of the applicationD . Change in regulationsView AnswerAnswer: A Explanation: Any time a major functional change of an application occurs, a new BCDR...

June 20, 2019 No Comments READ MORE +

Which of the following roles is responsible for peering with other cloud services and providers?

Which of the following roles is responsible for peering with other cloud services and providers?A . Cloud auditorB . Inter-cloud providerC . Cloud service brokerD . Cloud service developerView AnswerAnswer: B Explanation: The inter-cloud provider is responsible for peering with other cloud services and providers, as well as overseeing and...

June 20, 2019 No Comments READ MORE +

Which of the following would NOT be a reason to activate a BCDR strategy?

Which of the following would NOT be a reason to activate a BCDR strategy?A . Staffing lossB . Terrorism attackC . Utility disruptionsD . Natural disasterView AnswerAnswer: A Explanation: The loss of staffing would not be a reason to declare a BCDR situation because it does not impact production operations...

June 20, 2019 No Comments READ MORE +