Which of the following is not a risk management framework?

Which of the following is not a risk management framework?A . COBITB . Hex GBLC . ISO 31000:2009D . NIST SP 800-37View AnswerAnswer: B Explanation: Hex GBL is a reference to a computer part in Terry Pratchett’s fictional Discworld universe. The rest are not.

June 16, 2019 No Comments READ MORE +

Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?

Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?A . Modify dataB . Modify metadataC . New dataD . Import dataView AnswerAnswer: B Explanation: Modifying the metadata does not change the actual data. Although this initial phase is called "create,"...

June 16, 2019 No Comments READ MORE +

Which US program was designed to help companies overcome these differences?

There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the...

June 16, 2019 No Comments READ MORE +

GAAPs are created and maintained by which organization?

GAAPs are created and maintained by which organization?A . ISO/IECB . AICPAC . PCI CouncilD . ISOView AnswerAnswer: B Explanation: The AICPA is the organization responsible for generating and maintaining what are the Generally Accepted Accounting Practices in the United States.

June 16, 2019 No Comments READ MORE +

Which of the following is NOT a focus or consideration of an internal audit?

Which of the following is NOT a focus or consideration of an internal audit?A . CertificationB . DesignC . CostsD . Operational efficiencyView AnswerAnswer: A Explanation: In order to obtain and comply with certifications, independent external audits must be performed and satisfied. Although some testing of certification controls can be...

June 16, 2019 No Comments READ MORE +

Which of the following is a widely used tool for code development, branching, and collaboration?

Which of the following is a widely used tool for code development, branching, and collaboration?A . GitHubB . MaestroC . OrchestratorD . ConductorView AnswerAnswer: A Explanation: GitHub is an open source tool that developers leverage for code collaboration, branching, and versioning.

June 16, 2019 No Comments READ MORE +

You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?

You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing...

June 16, 2019 No Comments READ MORE +

In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?

In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?A . LimitB . CapC . ThrottleD . ReservationView AnswerAnswer: A Explanation: A limit puts a...

June 15, 2019 No Comments READ MORE +

Which of the following is considered an internal redundancy for a data center?

Which of the following is considered an internal redundancy for a data center?A . Power distribution unitsB . Network circuitsC . Power substationsD . GeneratorsView AnswerAnswer: A Explanation: Power distribution units are internal to a data center and supply power to internal components such as racks, appliances, and cooling systems....

June 15, 2019 No Comments READ MORE +

Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed?

Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed?A . IPSB . WAFC . FirewallD . IDSView AnswerAnswer: D Explanation: An intrusion detection system (IDS) is designed to analyze network packets, compare their contents or characteristics against a...

June 15, 2019 No Comments READ MORE +