What does the REST API support that the SOAP API does NOT support?

With an API, various features and optimizations are highly desirable to scalability, reliability, and security. What does the REST API support that the SOAP API does NOT support?A . AccelerationB . CachingC . RedundancyD . EncryptionView AnswerAnswer: B Explanation: The Simple Object Access Protocol (SOAP) does not support caching, whereas...

July 16, 2019 No Comments READ MORE +

Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?

Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based IDS over a host-based IDS, assuming all capabilities are equal?A . Segregated from host systemsB . Network accessC . ScalabilityD . External to system patchingView AnswerAnswer: A Explanation:...

July 16, 2019 No Comments READ MORE +

What is the primary reason that makes resolving jurisdictional conflicts complicated?

What is the primary reason that makes resolving jurisdictional conflicts complicated?A . Different technology standardsB . CostsC . Language barriersD . Lack of international authorityView AnswerAnswer: D Explanation: With international operations, systems ultimately cross many jurisdictional boundaries, and many times, they conflict with each other. The major hurdle to overcome...

July 16, 2019 No Comments READ MORE +

Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?

Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?A . RegulationB . MultitenancyC . VirtualizationD . Resource poolingView AnswerAnswer: B Explanation: With cloud providers hosting a number of different customers, it would be impractical...

July 16, 2019 No Comments READ MORE +

Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?

Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?A . A Type 2 hypervisor runs on top of another operating system and is dependent on the security of the OS for its own security.B . A Type 2 hypervisor allows users to directly...

July 16, 2019 No Comments READ MORE +

What is an often overlooked concept that is essential to protecting the confidentiality of data?

What is an often overlooked concept that is essential to protecting the confidentiality of data?A . Strong passwordB . TrainingC . Security controlsD . PoliciesView AnswerAnswer: B Explanation: While the main focus of confidentiality revolves around technological requirements or particular security methods, an important and often overlooked aspect of safeguarding...

July 16, 2019 No Comments READ MORE +

Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?

Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured?A . PublicB . CommunityC . HybridD . PrivateView AnswerAnswer: D Explanation: A private cloud model, and the specific contractual relationships involved, will give...

July 15, 2019 No Comments READ MORE +

Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?

Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?A . DaaSB . PaaSC . IaaSD . SaaSView AnswerAnswer: B Explanation: Platform as a Service would allow software...

July 15, 2019 No Comments READ MORE +

Which data state would be most likely to use TLS as a protection mechanism?

Which data state would be most likely to use TLS as a protection mechanism?A . Data in useB . Data at restC . ArchivedD . Data in transitView AnswerAnswer: D Explanation: TLS would be used with data in transit, when packets are exchanged between clients or services and sent across...

July 15, 2019 No Comments READ MORE +

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?

Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?A . MemoryB . Number of usersC . StorageD . CPUView AnswerAnswer: B Explanation: Within IaaS, where the cloud customer is responsible for everything beyond the physical network, the...

July 15, 2019 No Comments READ MORE +