What must SOAP rely on for security?
What must SOAP rely on for security?A . EncryptionB . TokenizationC . TLSD . SSLView AnswerAnswer: A Explanation: Simple Object Access Protocol (SOAP) uses Extensible Markup Language (XML) for passing data, and it must rely on the encryption of those data packages for security.
With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?
With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?A . Filtering and forwardingB . Filtering and firewallingC . Firewalling and forwardingD . Forwarding and protocolView AnswerAnswer: A Explanation: With SDN, the filtering and forwarding capabilities and...
Which of the following roles is responsible for creating cloud components and the testing and validation of services?
Which of the following roles is responsible for creating cloud components and the testing and validation of services?A . Cloud auditorB . Inter-cloud providerC . Cloud service brokerD . Cloud service developerView AnswerAnswer: D Explanation: The cloud service developer is responsible for developing and creating cloud components and services, as...
Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?
Which of the following threat types can occur when an application does not properly validate input and can be leveraged to send users to malicious sites that appear to be legitimate?A . Unvalidated redirects and forwardsB . Insecure direct object referencesC . Security miscomfigurationD . Sensitive data exposureView AnswerAnswer: A...
When is a virtual machine susceptible to attacks while a physical server in the same state would not be?
When is a virtual machine susceptible to attacks while a physical server in the same state would not be?A . When it is behind a WAFB . When it is behind an IPSC . When it is not patchedD . When it is powered offView AnswerAnswer: D Explanation: A virtual...
What type of masking strategy involves making a separate and distinct copy of data with masking in place?
What type of masking strategy involves making a separate and distinct copy of data with masking in place?A . DynamicB . ReplicationC . StaticD . DuplicationView AnswerAnswer: C Explanation: With static masking, a separate and distinct copy of the data set is created with masking in place. This is typically...
What provides the information to an application to make decisions about the authorization level appropriate when granting access?
What provides the information to an application to make decisions about the authorization level appropriate when granting access?A . UserB . Relying partyC . FederationD . Identity ProviderView AnswerAnswer: D Explanation: Upon successful user authentication, the identity provider gives information about the user to the relying party that it needs...
Which of the following service capabilities gives the cloud customer the most control over resources and configurations?
Which of the following service capabilities gives the cloud customer the most control over resources and configurations?A . DesktopB . PlatformC . InfrastructureD . SoftwareView AnswerAnswer: C Explanation: The infrastructure service capability gives the cloud customer substantial control in provisioning and configuring resources, including processing, storage, and network resources.
What does the "SOC" acronym refer to with audit reports?
What does the "SOC" acronym refer to with audit reports?A . Service Origin ConfidentialityB . System Organization ConfidentialityC . Service Organizational ControlD . System Organization ControlView AnswerAnswer: C
What is the biggest challenge to data discovery in a cloud environment?
What is the biggest challenge to data discovery in a cloud environment?A . FormatB . OwnershipC . LocationD . MultitenancyView AnswerAnswer: C Explanation: With the distributed nature of cloud environments, the foremost challenge for data discovery is awareness of the location of data and keeping track of it during the...