Which of the following configurations is needed to ensure this requirement is achieved?
The InfoSec team has directed compliance database activity monitoring without agents on a hosted database server in the public IaaS. Which of the following configurations is needed to ensure this requirement is achieved?A . Configure the agent configuration file to log to the syslog server.B . Configure sniffing mode on...
To which of the following security services is the script MOST likely to upload these signatures?
The administrator at a SaaS provider wants to improve security of the systems hosting the SaaS application. The administrator has created a script that monitors malware research sites and automatically creates and uploads signatures when new vulnerabilities are announced. To which of the following security services is the script MOST...
Which of the following is the BEST way to meet the need?
A large finance firm processes three times as many transactions in December of each year. The transactions are processed in a private cloud. Management wants to avoid adding permanent resources to accommodate the single month increase. Which of the following is the BEST way to meet the need?A . Migrate...
Which of the following should be deployed to secure the personal information?
A company is using storage-as-a-service from an IaaS provider for application services. The company has a mandate to protect personal information being stored on the cloud. The service provided includes encryption for in-transit data and requires a security solution for data-at-rest. Which of the following should be deployed to secure...
Which of the following is the MOST efficient security tool to implement?
Several of an organization's mobile applications are hosted in a cloud environment, and the risk team requires cross-site scripting protection to ensure availability. Which of the following is the MOST efficient security tool to implement?A . IPSecB . WAFC . VPND . HIPSView AnswerAnswer: B
Which of the following technologies BEST fits the customer’s needs?
A customer has requirements for its application data to be copied into a second location for failover possibilities. Latency should be minimized, while RPO and RTO are over 15 minutes. Which of the following technologies BEST fits the customer’s needs?A . Data mirroringB . Snapshot copiesC . Storage cloningD ....
Which of the following should the technician consider doing FIRST?
A company has hired a technician to build a cloud infrastructure for a massively parallel application. Which of the following should the technician consider doing FIRST?A . Add a GPU to the VMsB . Configure the VMs to scale up automaticallyC . Allocate maximum bandwidth to the VMsD . Select...
Which of the following BEST describes where the administrator would define this?
An administrator defines a backup as follows: ✑ One weekly full backup ✑ Daily incremental backup Which of the following BEST describes where the administrator would define this?A . Backup SLA documentB . Backup orchestration workflowC . Backup scheduleD . Provisioning scheduleView AnswerAnswer: C
If corporate policy requires N+1 host capacity, which of the following metrics is MOST likely to present a problem?
A systems administrator created several new VMs on a private cloud and wants to ensure the new baseline still meets corporate guidelines. The administrator finds the following new load numbers on the hosts: If corporate policy requires N+1 host capacity, which of the following metrics is MOST likely to present...
Which of the following is the BEST course of action to remediate the vulnerability?
One of the IaaS production web servers has a critical OS vulnerability that requires remediation. The vulnerability report indicates it is a zero-day exploit. Which of the following is the BEST course of action to remediate the vulnerability?A . Schedule the update via the patch management system to be applied...