What is the data encapsulation used with the SOAP protocol referred to?
What is the data encapsulation used with the SOAP protocol referred to?A . PacketB . EnvelopeC . PayloadD . ObjectView AnswerAnswer: B Explanation: Simple Object Access Protocol (SOAP) encapsulates its information in what is known as a SOAP envelope and then leverages common communications protocols for transmission.
Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?
Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?A . StructuredB . UnstructuredC . VolumeD . ObjectView AnswerAnswer: D Explanation: Object storage is typically used to house virtual machine images because it is independent from other systems and is focused solely...
What is the biggest benefit to leasing space in a data center versus building or maintain your own?
What is the biggest benefit to leasing space in a data center versus building or maintain your own?A . CertificationB . CostsC . RegulationD . ControlView AnswerAnswer: B Explanation: When leasing space in a data center, an organization can avoid the enormous startup and building costs associated with a data...
Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?
Jurisdictions have a broad range of privacy requirements pertaining to the handling of personal data and information. Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?A . JapanB . United StatesC . European...
Which of the following is NOT a function performed by the handshake protocol of TLS?
Which of the following is NOT a function performed by the handshake protocol of TLS?A . Key exchangeB . EncryptionC . Negotiation of connectionD . Establish session IDView AnswerAnswer: B Explanation: The handshake protocol negotiates and establishes the connection as well as handles the key exchange and establishes the session...
Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?
Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?A . A Type 1 hypervisor also controls patching of its hosted virtual machines ensure they are always secure.B . A Type 1 hypervisor is tied directly to the bare metal and only runs with...
Which of the following attempts to establish an international standard for eDiscovery processes and best practices?
Which of the following attempts to establish an international standard for eDiscovery processes and best practices?A . ISO/IEC 31000B . ISO/IEC 27050C . ISO/IEC 19888D . ISO/IEC 27001View AnswerAnswer: B Explanation: ISO/IEC 27050 strives to establish an internationally accepted standard for eDiscovery processes and best practices. It encompasses all steps...
Where is a DLP solution generally installed when utilized for monitoring data in transit?
Where is a DLP solution generally installed when utilized for monitoring data in transit?A . Network perimeterB . Database serverC . Application serverD . Web serverView AnswerAnswer: A Explanation: To monitor data in transit, a DLP solution would optimally be installed at the network perimeter, to ensure that data leaving...
What does dynamic application security testing (DAST) NOT entail?
What does dynamic application security testing (DAST) NOT entail?A . ScanningB . ProbingC . DiscoveryD . Knowledge of the systemView AnswerAnswer: D Explanation: Dynamic application security testing (DAST) is considered "black box" testing and begins with no inside knowledge of the application or its configurations. Everything about the application must...
Which process serves to prove the identity and credentials of a user requesting access to an application or data?
Which process serves to prove the identity and credentials of a user requesting access to an application or data?A . RepudiationB . AuthenticationC . IdentificationD . AuthorizationView AnswerAnswer: B Explanation: Authentication is the process of proving whether the identity presented by a user is true and valid. This can be...