Which aspect of cloud computing will be most negatively impacted by vendor lock-in?
Answer : D
Explanation:
A cloud customer utilizing proprietary APIs or services from one cloud provider that are unlikely to be available from another cloud provider will most negatively impact portability.
Which of the following APIs are most commonly used within a cloud environment?
Answer : B
Explanation:
Simple Object Access Protocol (SOAP) and Representational State Transfer (REST) are the most commonly used APIs within a cloud environment. Extensible
Markup Language (XML) and Security Assertion Markup Language (SAML) are both standards for exchanging encoded data between two parties, with XML being for more general use and SAML focused on authentication and authorization data.
Which of the following attempts to establish an international standard for eDiscovery processes and best practices?
Answer : B
Explanation:
ISO/IEC 27050 strives to establish an internationally accepted standard for eDiscovery processes and best practices. It encompasses all steps of the eDiscovery process: identification, preservation, collection, processing, review, analysis, and the final production of the requested data.
Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?
Answer : B
Explanation:
The cloud service broker is responsible for obtaining new customers, analyzing the marketplace, and securing contracts and agreements.
Which term relates to the application of scientific methods and practices to evidence?
Answer : A
Explanation:
Forensics is the application of scientific and methodical processes to identify, collect, preserve, analyze, and summarize/report digital information and evidence.
Which of the following roles involves the provisioning and delivery of cloud services?
Answer : C
Explanation:
The cloud service manager is responsible for the delivery of cloud services, the provisioning of cloud services, and the overall management of cloud services.
What is the primary reason that makes resolving jurisdictional conflicts complicated?
Answer : D
Explanation:
With international operations, systems ultimately cross many jurisdictional boundaries, and many times, they conflict with each other. The major hurdle to overcome for an organization is the lack of an ultimate international authority to mediate such conflicts, with a likely result of legal efforts in each jurisdiction.
GAAPs are created and maintained by which organization?
Answer : B
Explanation:
The AICPA is the organization responsible for generating and maintaining what are the Generally Accepted Accounting Practices in the United States.
Which of the following roles is responsible for preparing systems for the cloud, administering and monitoring services, and managing inventory and assets?
Answer : C
Explanation:
The cloud service operations manager is responsible for preparing systems for the cloud, administering and monitoring services, providing audit data as requested or required, and managing inventory and assets.
Which protocol allows a system to use block-level storage as if it was a SAN, but over TCP network traffic instead?
Answer : B
Explanation:
iSCSI is a protocol that allows for the transmission and use of SCSI commands and features over a TCP-based network. iSCSI allows systems to use block-level storage that looks and behaves as a SAN would with physical servers, but to leverage the TCP network within a virtualized environment and cloud.
Which of the cloud deployment models is used by popular services such as iCloud, Dropbox, and OneDrive?
Answer : B
Explanation:
Popular services such as iCloud, Dropbox, and OneDrive are all publicly available and are open to any user for free, with possible add-on services offered for a cost.
Why does a Type 2 hypervisor typically offer less security control than a Type 1 hypervisor?
Answer : A
Explanation:
A Type 2 hypervisor differs from a Type 1 hypervisor in that it runs on top of another operating system rather than directly tied into the underlying hardware of the virtual host servers. With this type of implementation, additional security and architecture concerns come into play because the interaction between the operating system and the hypervisor becomes a critical link. The hypervisor no longer has direct interaction and control over the underlying hardware, which means that some performance will be lost due to the operating system in the middle needing its own resources, patching requirements, and operational oversight.
Which is the appropriate phase of the cloud data lifecycle for determining the data's classification?
Answer : A
Explanation:
Any time data is created, modified, or imported, the classification needs to be evaluated and set from the earliest phase to ensure security is always properly maintained for the duration of its lifecycle.
Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air
Conditioning Engineers (ASHRAE)?
Answer : B
Explanation:
The guidelines from ASHRAE establish 64.4-80.6degF (18-27degC) as the optimal temperature for a data center.
Which of the following is not a risk management framework?
Answer : B
Explanation:
Hex GBL is a reference to a computer part in Terry Pratchettג€™s fictional Discworld universe. The rest are not.
Have any questions or issues ? Please dont hesitate to contact us