Which task describes adherence to compliance?
Which task describes adherence to compliance?A . Ensure security policies are being enforced B. Define access rights to users C. Assess the cloud provider’s capability to provide logs D. Assess assets with realistic valuationsView AnswerAnswer: A
To which team should the error-correction activity be transferred?
The incident management team is unable to determine the root cause of an incident. To which team should the error-correction activity be transferred?A . Performance Management B. Change Management C. Availability Management D. Problem ManagementView AnswerAnswer: D
Which software-defined storage controller function gathers data about the components and brings them under its control and management?
Which software-defined storage controller function gathers data about the components and brings them under its control and management?A . Storage provisioning B. Storage discovery C. Resource abstraction and pooling D. Storage component managementView AnswerAnswer: B
What refers to the logging of all transactions when assessing the effectiveness of security controls in a cloud computing environment?
What refers to the logging of all transactions when assessing the effectiveness of security controls in a cloud computing environment?A . Accounting B. Monitoring C. Auditing D. MeteringView AnswerAnswer: C
Which product is a single-instance, multitenant integration platform as a service that provides a unified online development and management environment?
Which product is a single-instance, multitenant integration platform as a service that provides a unified online development and management environment?A . MyService 360 B. ViPR SRM C. Data Protection Advisor D. Dell BoomiView AnswerAnswer: D
What mechanism does RSA SecurID use?
What mechanism does RSA SecurID use?A . Single sign-on authentication B. Policy-based authorization C. Multi-factor authentication D. Role-based authorizationView AnswerAnswer: C
What is an advantage of adopting a microservices strategy in an application development environment?
What is an advantage of adopting a microservices strategy in an application development environment?A . All microservices of an application are always updated at the same time for maintaining consistency in the application B. Every microservice can be deployed, upgraded, scaled, and restarted independent of other services in the application...
Which method optimizes network performance by distributing network traffic across the shared bandwidth of all the ISLs?
Which method optimizes network performance by distributing network traffic across the shared bandwidth of all the ISLs?A . Link aggregation B. Network zoning C. Network segmentation D. Link failoverView AnswerAnswer: A
Match each information security concept with its description
DRAG DROP Match each information security concept with its description. View AnswerAnswer:
What is a characteristic of thin LUNs?
What is a characteristic of thin LUNs?A . When a thin LUN is destroyed, its allocated capacity is automatically reclaimed to the pool. B. When a thin LUN is created, physical storage is fully allocated for it C. Once a thin LUN is created it cannot be destroyed until all...