Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?

An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer. Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?A . NetworkB . UsersC . MemoryD . CPUView AnswerAnswer: B Explanation: Dealing with...

August 8, 2019 No Comments READ MORE +

Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?

Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?A . Cryptographic erasureB . ZeroingC . OverwritingD . DeletionView AnswerAnswer: D Explanation: Deletion merely removes the pointers to data on a system; it does nothing to actually remove...

August 8, 2019 No Comments READ MORE +

Which value refers to the percentage of production level restoration needed to meet BCDR objectives?

Which value refers to the percentage of production level restoration needed to meet BCDR objectives?A . RPOB . RTOC . RSLD . SREView AnswerAnswer: C Explanation: The recovery service level (RSL) is a percentage measure of the total typical production service level that needs to be restored to meet BCDR...

August 8, 2019 No Comments READ MORE +

What is used for local, physical access to hardware within a data center?

What is used for local, physical access to hardware within a data center?A . SSHB . KVMC . VPND . RDPView AnswerAnswer: B Explanation: Local, physical access in a data center is done via KVM (keyboard, video, mouse) switches.

August 8, 2019 No Comments READ MORE +

Which United States law is focused on PII as it relates to the financial industry?

Which United States law is focused on PII as it relates to the financial industry?A . HIPAAB . SOXC . Safe HarborD . GLBAView AnswerAnswer: D Explanation: The GLBA, as it is commonly called based on the lead sponsors and authors of the act, is officially known as "The Financial...

August 7, 2019 No Comments READ MORE +

Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?

Which of the following threat types involves an application that does not validate authorization for portions of itself after the initial checks?A . InjectionB . Missing function-level access controlC . Cross-site request forgeryD . Cross-site scriptingView AnswerAnswer: B Explanation: It is imperative that an application perform checks when each function...

August 7, 2019 No Comments READ MORE +

Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?

Which networking concept in a cloud environment allows for network segregation and isolation of IP spaces?A . PLANB . WANC . LAND . VLANView AnswerAnswer: D Explanation: A virtual area network (VLAN) allows the logical separation and isolation of networks and IP spaces to provide enhanced security and controls.

August 7, 2019 No Comments READ MORE +

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?

Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?A . Inter-cloud providerB . Cloud service business managerC . Cloud service administratorD . Cloud service integratorView AnswerAnswer: A Explanation: The inter-cloud provider is responsible for peering with other cloud...

August 7, 2019 No Comments READ MORE +

Which of the following storage types is most closely associated with a traditional file system and tree structure?

Which of the following storage types is most closely associated with a traditional file system and tree structure?A . VolumeB . UnstructuredC . ObjectD . StructuredView AnswerAnswer: A Explanation: Volume storage works as a virtual hard drive that is attached to a virtual machine. The operating system sees the volume...

August 7, 2019 No Comments READ MORE +

What does SDN stand for within a cloud environment?

What does SDN stand for within a cloud environment?A . Software-dynamic networkingB . Software-defined networkingC . Software-dependent networkingD . System-dynamic nodesView AnswerAnswer: B Explanation: Software-defined networking separates the administration of network filtering and network forwarding to allow for distributed administration.

August 7, 2019 No Comments READ MORE +