Which security mechanism integrates with these mechanisms and uses heuristics to learn user behavior and detect fraudulent activity?

A cloud service provider has standalone mechanisms such as intrusion detection and prevention systems and firewalls in a cloud infrastructure. Which security mechanism integrates with these mechanisms and uses heuristics to learn user behavior and detect fraudulent activity?A . iSNS discovery domainB . HardeningC . Adaptive securityD . KerberosView AnswerAnswer:...

March 9, 2024 No Comments READ MORE +

Which EMC security product measures the risk associated with a user’s login and post-login activities by evaluating a variety of risk indicators?

Which EMC security product measures the risk associated with a user’s login and post-login activities by evaluating a variety of risk indicators?A . RSA Security AnalyticsB . RSA Adaptive AuthenticationC . RSA Archer eGRCD . RSA SecurIDView AnswerAnswer: B

March 9, 2024 No Comments READ MORE +

Which product delivers software-defined networks and security with a broad range of services, including a virtual firewall, virtual private network, load balancing, and VXLAN extended networks?

Which product delivers software-defined networks and security with a broad range of services, including a virtual firewall, virtual private network, load balancing, and VXLAN extended networks?A . RSA Archer eGRCB . RSA Adaptive AuthenticationC . VMware vCloud Networking and SecurityD . RSA Security AnalyticsView AnswerAnswer: C

March 9, 2024 No Comments READ MORE +

What is the goal of lean practices in a software development methodology?

What is the goal of lean practices in a software development methodology?A . Create quality software with the minimum number of team membersB . Create quality software in the shortest time period at the lowest costC . Develop software using 12-Factor modern application practicesD . Develop and deploy software using...

March 8, 2024 No Comments READ MORE +

What is a virtual appliance?

What is a virtual appliance?A . A preconfigured virtual machine, preinstalled with a guest OS and an application, dedicated to a specific functionB . A master copy of a virtual machine with a standardized virtual hardware and software configuration that is used to create new virtual machinesC . An interface...

March 8, 2024 No Comments READ MORE +

What is the effect on the VM if the memory capacity or processing power available to the VM is less than 2 GB and 1200 MHz respectively?

Consider a virtual machine (VM) with 2 GB memory capacity and 1200 MHz processing power as its lower bounds, and 4 GB memory capacity and 2400 MHz processing power as its upper bounds. What is the effect on the VM if the memory capacity or processing power available to the...

March 8, 2024 No Comments READ MORE +

Which strategy did the cloud provider use to mitigate the risk of security threats?

A cloud provider installs a virtual firewall on a hypervisor to reduce the scope of a security breach when there is already a network-based firewall deployed in the cloud environment. Which strategy did the cloud provider use to mitigate the risk of security threats?A . Trusted computing baseB . Defense-in-depthC...

March 7, 2024 No Comments READ MORE +

What is a benefit of stretching a compute cluster across service availability zones in a cloud environment?

What is a benefit of stretching a compute cluster across service availability zones in a cloud environment?A . Enables dynamic workload balancing across zonesB . Provides high security for compute systems across zonesC . Reduces bandwidth requirements for replication across zonesD . Reduces the possibility of disasters occurring in one...

March 7, 2024 No Comments READ MORE +

What describes network-attached storage (NAS)?

What describes network-attached storage (NAS)?A . High-performance file server that either has integrated storage or is connected to external storageB . Dedicated file server that maintains the mapping between the object IDs and the file system namespaceC . Storage system used for creation and assignment of block storage volumes to...

March 7, 2024 No Comments READ MORE +

Which cloud service model enables an organization to deploy a proprietary operating system and applications on a cloud provider's resources?

Which cloud service model enables an organization to deploy a proprietary operating system and applications on a cloud provider's resources?A . Infrastructure as a ServiceB . Platform as a ServiceC . Software as a ServiceD . Desktop as a ServiceView AnswerAnswer: A

March 7, 2024 No Comments READ MORE +