Which cloud deployment model is MOST likely to offer free or very cheap services to users?
Which cloud deployment model is MOST likely to offer free or very cheap services to users?A . HybridB . CommunityC . PublicD . PrivateView AnswerAnswer: C Explanation: Public clouds offer services to anyone, regardless of affiliation, and are the most likely to offer free services to users. Examples of public...
Which type of testing uses the same strategies and toolsets that hackers would use?
Which type of testing uses the same strategies and toolsets that hackers would use?A . PenetrationB . DynamicC . StaticD . MaliciousView AnswerAnswer: A Explanation: Penetration testing involves using the same strategies and toolsets that hackers would use against a system to discovery potential vulnerabilities.
Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?
Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?A . VolumeB . UnstructuredC . StructuredD . ObjectView AnswerAnswer: A Explanation: Volume storage is allocated and mounted as a virtual hard drive within IaaS...
Within a SaaS environment, what is the responsibility on the part of the cloud customer in regard to procuring the software used?
Within a SaaS environment, what is the responsibility on the part of the cloud customer in regard to procuring the software used?A . MaintenanceB . LicensingC . DevelopmentD . PurchasingView AnswerAnswer: B Explanation: Within a SaaS implementation, the cloud customer licenses the use of the software from the cloud provider...
In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?
In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?A . DemagnetizingB . ShreddingC . DegaussingD . Cryptographic erasureView AnswerAnswer: D Explanation: Cryptographic erasure is a secure method to destroy data...
Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?
Which of the following represents a prioritization of applications or cloud customers for the allocation of additional requested resources when there is a limitation on available resources?A . ProvisionB . LimitC . ReservationD . ShareView AnswerAnswer: D Explanation: The concept of shares within a cloud environment is used to mitigate...
Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?
Which of the cloud deployment models involves spanning multiple cloud environments or a mix of cloud hosting models?A . CommunityB . PublicC . HybridD . PrivateView AnswerAnswer: C Explanation: A hybrid cloud model involves the use of more than one type of cloud hosting models, typically the mix of private...
Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?
Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer?A . HybridB . CommunityC . PrivateD . PublicView AnswerAnswer: D Explanation: Because the public cloud model is available to everyone, in most instances all a customer will need to do to gain access...
How many additional DNS queries are needed when DNSSEC integrity checks are added?
How many additional DNS queries are needed when DNSSEC integrity checks are added?A . ThreeB . ZeroC . OneD . TwoView AnswerAnswer: B Explanation: DNSSEC does not require any additional DNS queries to be performed. The DNSSEC integrity checks and validations are all performed as part of the single DNS...
Which type of controls are the SOC Type 1 reports specifically focused on?
Which type of controls are the SOC Type 1 reports specifically focused on?A . IntegrityB . PIIC . FinancialD . PrivacyView AnswerAnswer: C Explanation: SOC Type 1 reports are focused specifically on internal controls as they relate to financial reporting.