What is the data encapsulation used with the SOAP protocol referred to?

What is the data encapsulation used with the SOAP protocol referred to?A . PacketB . EnvelopeC . PayloadD . ObjectView AnswerAnswer: B Explanation: Simple Object Access Protocol (SOAP) encapsulates its information in what is known as a SOAP envelope and then leverages common communications protocols for transmission.

July 29, 2019 No Comments READ MORE +

Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?

Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?A . StructuredB . UnstructuredC . VolumeD . ObjectView AnswerAnswer: D Explanation: Object storage is typically used to house virtual machine images because it is independent from other systems and is focused solely...

July 28, 2019 No Comments READ MORE +

What is the biggest benefit to leasing space in a data center versus building or maintain your own?

What is the biggest benefit to leasing space in a data center versus building or maintain your own?A . CertificationB . CostsC . RegulationD . ControlView AnswerAnswer: B Explanation: When leasing space in a data center, an organization can avoid the enormous startup and building costs associated with a data...

July 28, 2019 No Comments READ MORE +

Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?

Jurisdictions have a broad range of privacy requirements pertaining to the handling of personal data and information. Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?A . JapanB . United StatesC . European...

July 28, 2019 No Comments READ MORE +

Which of the following is NOT a function performed by the handshake protocol of TLS?

Which of the following is NOT a function performed by the handshake protocol of TLS?A . Key exchangeB . EncryptionC . Negotiation of connectionD . Establish session IDView AnswerAnswer: B Explanation: The handshake protocol negotiates and establishes the connection as well as handles the key exchange and establishes the session...

July 28, 2019 No Comments READ MORE +

Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?

Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?A . A Type 1 hypervisor also controls patching of its hosted virtual machines ensure they are always secure.B . A Type 1 hypervisor is tied directly to the bare metal and only runs with...

July 28, 2019 No Comments READ MORE +

Which of the following attempts to establish an international standard for eDiscovery processes and best practices?

Which of the following attempts to establish an international standard for eDiscovery processes and best practices?A . ISO/IEC 31000B . ISO/IEC 27050C . ISO/IEC 19888D . ISO/IEC 27001View AnswerAnswer: B Explanation: ISO/IEC 27050 strives to establish an internationally accepted standard for eDiscovery processes and best practices. It encompasses all steps...

July 28, 2019 No Comments READ MORE +

Where is a DLP solution generally installed when utilized for monitoring data in transit?

Where is a DLP solution generally installed when utilized for monitoring data in transit?A . Network perimeterB . Database serverC . Application serverD . Web serverView AnswerAnswer: A Explanation: To monitor data in transit, a DLP solution would optimally be installed at the network perimeter, to ensure that data leaving...

July 28, 2019 No Comments READ MORE +

What does dynamic application security testing (DAST) NOT entail?

What does dynamic application security testing (DAST) NOT entail?A . ScanningB . ProbingC . DiscoveryD . Knowledge of the systemView AnswerAnswer: D Explanation: Dynamic application security testing (DAST) is considered "black box" testing and begins with no inside knowledge of the application or its configurations. Everything about the application must...

July 28, 2019 No Comments READ MORE +

Which process serves to prove the identity and credentials of a user requesting access to an application or data?

Which process serves to prove the identity and credentials of a user requesting access to an application or data?A . RepudiationB . AuthenticationC . IdentificationD . AuthorizationView AnswerAnswer: B Explanation: Authentication is the process of proving whether the identity presented by a user is true and valid. This can be...

July 27, 2019 No Comments READ MORE +