CCSP Topic 3
Question #: 201
Topic #: 1
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.
Which role would you be assuming under this directive?
A. Cloud service administrator
B. Cloud service user
C. Cloud service integrator
D. Cloud service business manager
Selected Answer: C
Question #: 202
Topic #: 1
One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.
Which aspect of cloud computing makes this particular component more challenging than in a traditional data center?
A. Portability
B. Virtualization
C. Elasticity
D. Resource pooling
Selected Answer: B
Question #: 203
Topic #: 1
In the wake of many scandals with major corporations involving fraud and the deception of investors and regulators, which of the following laws was passed to govern accounting and financial records and disclosures?
A. GLBA
B. Safe Harbor
C. HIPAA
D. SOX
Selected Answer: D
Question #: 204
Topic #: 1
Which one of the following threat types to applications and services involves the sending of requests that are invalid and manipulated through a user’s client to execute commands on the application under the user’s own credentials?
A. Injection
B. Missing function-level access control
C. Cross-site scripting
D. Cross-site request forgery
Selected Answer: D
Question #: 205
Topic #: 1
Which cloud service category would be most ideal for a cloud customer that is developing software to test its applications among multiple hosting providers to determine the best option for its needs?
A. DaaS
B. PaaS
C. IaaS
D. SaaS
Selected Answer: B
Question #: 206
Topic #: 1
You just hired an outside developer to modernize some applications with new web services and functionality. In order to implement a comprehensive test platform for validation, the developer needs a data set that resembles a production data set in both size and composition.
In order to accomplish this, what type of masking would you use?
A. Development
B. Replicated
C. Static
D. Dynamic
Selected Answer: C
Question #: 207
Topic #: 1
In order to prevent cloud customers from potentially consuming enormous amounts of resources within a cloud environment and thus having a negative impact on other customers, what concept is commonly used by a cloud provider?
A. Limit
B. Cap
C. Throttle
D. Reservation
Selected Answer: C
Question #: 208
Topic #: 1
Where is a DLP solution generally installed when utilized for monitoring data at rest?
A. Network firewall
B. Host system
C. Application server
D. Database server
Selected Answer: B
Question #: 209
Topic #: 1
Which of the following aspects of security is solely the responsibility of the cloud provider?
A. Regulatory compliance
B. Physical security
C. Operating system auditing
D. Personal security of developers
Selected Answer: B
Question #: 210
Topic #: 1
Humidity levels for a data center are a prime concern for maintaining electrical and computing resources properly as well as ensuring that conditions are optimal for top performance.
Which of the following is the optimal humidity level, as established by ASHRAE?
A. 20 to 40 percent relative humidity
B. 50 to 75 percent relative humidity
C. 40 to 60 percent relative humidity
D. 30 to 50 percent relative humidity
Selected Answer: C
Question #: 211
Topic #: 1
Within a SaaS environment, what is the responsibility on the part of the cloud customer in regard to procuring the software used?
A. Maintenance
B. Licensing
C. Development
D. Purchasing
Selected Answer: B
Question #: 212
Topic #: 1
Implementing baselines on systems would take an enormous amount of time and resources if the staff had to apply them to each server, and over time, it would be almost impossible to keep all the systems in sync on an ongoing basis.
Which of the following is NOT a package that can be used for implementing and maintaining baselines across an enterprise?
A. Puppet
B. SCCM
C. Chef
D. GitHub
Selected Answer: D
Question #: 213
Topic #: 1
From the perspective of compliance, what is the most important consideration when it comes to data center location?
A. Natural disasters
B. Utility access
C. Jurisdiction
D. Personnel access
Selected Answer: C
Question #: 214
Topic #: 1
Different certifications and standards take different approaches to data center design and operations. Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?
A. IDCA
B. BICSI
C. Uptime Institute
D. NFPA
Selected Answer: A
Question #: 215
Topic #: 1
The European Union is often considered the world leader in regard to the privacy of personal data and has declared privacy to be a “human right.”
In what year did the EU first assert this principle?
A. 1995
B. 2000
C. 2010
D. 1999
Selected Answer: A
Question #: 216
Topic #: 1
A DLP solution/implementation has three main components.
Which of the following is NOT one of the three main components?
A. Monitoring
B. Enforcement
C. Auditing
D. Discovery and classification
Selected Answer: C
Question #: 217
Topic #: 1
What type of storage structure does object storage employ to maintain files?
A. Directory
B. Hierarchical
C. tree
D. Flat
Selected Answer: D
Question #: 218
Topic #: 1
Which cloud storage type requires special consideration on the part of the cloud customer to ensure they do not program themselves into a vendor lock-in situation?
A. Unstructured
B. Object
C. Volume
D. Structured
Selected Answer: B
Question #: 219
Topic #: 1
Which cloud deployment model would be ideal for a group of universities looking to work together, where each university can gain benefits according to its specific needs?
A. Private
B. Public
C. Hybrid
D. Community
Selected Answer: D
Question #: 220
Topic #: 1
Data centers have enormous power resources that are distributed and consumed throughout the entire facility.
Which of the following standards pertains to the proper fire safety standards within that scope?
A. IDCA
B. BICSI
C. NFPA
D. Uptime Institute
Selected Answer: C
Question #: 221
Topic #: 1
Which of the following threat types involves an application that does not validate authorization for portions of itself beyond when the user first enters it?
A. Cross-site request forgery
B. Missing function-level access control
C. Injection
D. Cross-site scripting
Selected Answer: B
Question #: 222
Topic #: 1
Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.
What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?
A. Distributed clustering
B. Distributed balancing
C. Distributed optimization
D. Distributed resource scheduling
Selected Answer: D
Question #: 223
Topic #: 1
Although the REST API supports a wide variety of data formats for communications and exchange, which data formats are the most commonly used?
A. SAML and HTML
B. XML and SAML
C. XML and JSON
D. JSON and SAML
Selected Answer: C
Question #: 224
Topic #: 1
The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/ contractors.
What technology would be useful for protecting data at this point?
A. IDS
B. DLP
C. IPS
D. WAF
Selected Answer: B
Question #: 225
Topic #: 1
When an API is being leveraged, it will encapsulate its data for transmission back to the requesting party or service.
What is the data encapsulation used with the SOAP protocol referred to as?
A. Packet
B. Payload
C. Object
D. Envelope
Selected Answer: D
Question #: 226
Topic #: 1
From a security perspective, what component of a cloud computing infrastructure represents the biggest concern?
A. Hypervisor
B. Management plane
C. Object storage
D. Encryption
Selected Answer: B
Question #: 227
Topic #: 1
Which of the following is NOT one of the main intended goals of a DLP solution?
A. Showing due diligence
B. Preventing malicious insiders
C. Regulatory compliance
D. Managing and minimizing risk
Selected Answer: A
Question #: 228
Topic #: 1
Data center and operations design traditionally takes a tiered, topological approach.
Which of the following standards is focused on that approach and is prevalently used throughout the industry?
A. IDCA
B. NFPA
C. BICSI
D. Uptime Institute
Selected Answer: D
Question #: 229
Topic #: 1
Jurisdictions have a broad range of privacy requirements pertaining to the handling of personal data and information.
Which jurisdiction requires all storage and processing of data that pertains to its citizens to be done on hardware that is physically located within its borders?
A. Japan
B. United States
C. European Union
D. Russia
Selected Answer: D
Question #: 230
Topic #: 1
The management plane is used to administer a cloud environment and perform administrative tasks across a variety of systems, but most specifically it’s used with the hypervisors.
What does the management plane typically leverage for this orchestration?
A. APIs
B. Scripts
C. TLS
D. XML
Selected Answer: A
Question #: 231
Topic #: 1
When dealing with PII, which category pertains to those requirements that can carry legal sanctions or penalties for failure to adequately safeguard the data and address compliance requirements?
A. Contractual
B. Jurisdictional
C. Regulated
D. Legal
Selected Answer: C
Question #: 232
Topic #: 1
Although the United States does not have a single, comprehensive privacy and regulatory framework, a number of specific regulations pertain to types of data or populations.
Which of the following is NOT a regulatory system from the United States federal government?
A. HIPAA
B. SOX
C. FISMA
D. PCI DSS
Selected Answer: D
Question #: 233
Topic #: 1
The president of your company has tasked you with implementing cloud services as the most efficient way of obtaining a robust disaster recovery configuration for your production services.
Which of the cloud deployment models would you MOST likely be exploring?
A. Hybrid
B. Private
C. Community
D. Public
Selected Answer: A
Question #: 234
Topic #: 1
If you are running an application that has strict legal requirements that the data cannot reside on systems that contain other applications or systems, which aspect of cloud computing would be prohibitive in this case?
A. Multitenancy
B. Broad network access
C. Portability
D. Elasticity
Selected Answer: A
Question #: 235
Topic #: 1
The REST API is a widely used standard for communications of web-based services between clients and the servers hosting them.
Which protocol does the REST API depend on?
A. HTTP
B. SSH
C. SAML
D. XML
Selected Answer: A
Question #: 236
Topic #: 1
Which of the following actions will NOT make data part of the create phase of the cloud data lifecycle?
A. Modify data
B. Modify metadata
C. New data
D. Import data
Selected Answer: B
Question #: 237
Topic #: 1
Most APIs will support a variety of different data formats or structures.
However, the SOAP API will only support which one of the following data formats?
A. XML
B. XSLT
C. JSON
D. SAML
Selected Answer: A
Question #: 238
Topic #: 1
Which cloud storage type is typically used to house virtual machine images that are used throughout the environment?
A. Structured
B. Unstructured
C. Volume
D. Object
Selected Answer: D
Question #: 239
Topic #: 1
With an API, various features and optimizations are highly desirable to scalability, reliability, and security.
What does the REST API support that the SOAP API does NOT support?
A. Acceleration
B. Caching
C. Redundancy
D. Encryption
Selected Answer: B
Question #: 240
Topic #: 1
Although much of the attention given to data security is focused on keeping data private and only accessible by authorized individuals, of equal importance is the trustworthiness of the data.
Which concept encapsulates this?
A. Validity
B. Integrity
C. Accessibility
D. Confidentiality
Selected Answer: B
Question #: 241
Topic #: 1
Three central concepts define what type of data and information an organization is responsible for pertaining to eDiscovery.
Which of the following are the three components that comprise required disclosure?
A. Possession, ownership, control
B. Ownership, use, creation
C. Control, custody, use
D. Possession, custody, control
Selected Answer: D
Question #: 242
Topic #: 1
Which of the following threat types involves the sending of commands or arbitrary data through input fields in an application in an attempt to get that code executed as part of normal processing?
A. Cross-site scripting
B. Missing function-level access control
C. Injection
D. Cross-site forgery
Selected Answer: C
Question #: 243
Topic #: 1
With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?
A. Structured and hierarchical
B. Volume and object
C. Volume and database
D. Structured and unstructured
Selected Answer: B
Question #: 244
Topic #: 1
Which of the following roles would be responsible for managing memberships in federations and the use and integration of federated services?
A. Inter-cloud provider
B. Cloud service business manager
C. Cloud service administrator
D. Cloud service integrator
Selected Answer: D
Question #: 245
Topic #: 1
Which data state would be most likely to use TLS as a protection mechanism?
A. Data in use
B. Data at rest
C. Archived
D. Data in transit
Selected Answer: D
Question #: 246
Topic #: 1
You are working for a cloud service provider and receive an eDiscovery order pertaining to one of your customers.
Which of the following would be the most appropriate action to take first?
A. Take a shapshot of the virtual machines
B. Escrow the encryption keys
C. Copy the data
D. Notify the customer
Selected Answer: D
Question #: 247
Topic #: 1
If a cloud computing customer wishes to guarantee that a minimum level of resources will always be available, which of the following set of services would compromise the reservation?
A. Memory and networking
B. CPU and software
C. CPU and storage
D. CPU and memory
Selected Answer: D
Question #: 248
Topic #: 1
Which of the following threat types can occur when baselines are not appropriately applied or when unauthorized changes are made?
A. Security misconfiguration
B. Insecure direct object references
C. Unvalidated redirects and forwards
D. Sensitive data exposure
Selected Answer: A
Question #: 249
Topic #: 1
Which of the following is considered an internal redundancy for a data center?
A. Power feeds
B. Chillers
C. Network circuits
D. Generators
Selected Answer: D
Question #: 250
Topic #: 1
Which of the following threat types involves the sending of invalid and manipulated requests through a user’s client to execute commands on the application under their own credentials?
A. Injection
B. Cross-site request forgery
C. Missing function-level access control
D. Cross-site scripting
Selected Answer: B
Question #: 251
Topic #: 1
With finite resources available within a cloud, even the largest cloud providers will at times need to determine which customers will receive additional resources first.
What is the term associated with this determination?
A. Weighting
B. Prioritization
C. Shares
D. Scoring
Selected Answer: B
Question #: 252
Topic #: 1
In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?
A. Demagnetizing
B. Shredding
C. Degaussing
D. Cryptographic erasure
Selected Answer: D
Question #: 253
Topic #: 1
Where is a DLP solution generally installed when utilized for monitoring data in use?
A. Application server
B. Database server
C. Network perimeter
D. User’s client
Selected Answer: D
Question #: 254
Topic #: 1
Which of the following aspects of cloud computing would make it more likely that a cloud provider would be unwilling to satisfy specific certification requirements?
A. Regulation
B. Multitenancy
C. Virtualization
D. Resource pooling
Selected Answer: B
Question #: 255
Topic #: 1
Which phase of the cloud data lifecycle would be the MOST appropriate for the use of DLP technologies to protect the data?
A. Use
B. Store
C. Share
D. Create
Selected Answer: C
Question #: 256
Topic #: 1
During which phase of the cloud data lifecycle is it possible for the classification of data to change?
A. Use
B. Archive
C. Create
D. Share
Selected Answer: A
Question #: 257
Topic #: 1
If a key feature of cloud computing that your organization desires is the ability to scale and expand without limit or concern about available resources, which cloud deployment model would you MOST likely be considering?
A. Public
B. Hybrid
C. Private
D. Community
Selected Answer: A
Question #: 258
Topic #: 1
What is a serious complication an organization faces from the compliance perspective with international operations?
A. Multiple jurisdictions
B. Different certifications
C. Different operational procedures
D. Different capabilities
Selected Answer: A
Question #: 259
Topic #: 1
ISO/IEC has established international standards for many aspects of computing and any processes or procedures related to information technology.
Which ISO/IEC standard has been established to provide a framework for handling eDiscovery processes?
A. ISO/IEC 27001
B. ISO/IEC 27002
C. ISO/IEC 27040
D. ISO/IEC 27050
Selected Answer: D
Question #: 260
Topic #: 1
If a company needed to guarantee through contract and SLAs that a cloud provider would always have available sufficient resources to start their services and provide a certain level of provisioning, what would the contract need to refer to?
A. Limit
B. Reservation
C. Assurance
D. Guarantee
Selected Answer: B
Question #: 261
Topic #: 1
Many aspects and features of cloud computing can make eDiscovery compliance more difficult or costly.
Which aspect of cloud computing would be the MOST complicating factor?
A. Measured service
B. Broad network access
C. Multitenancy
D. Portability
Selected Answer: C
Question #: 262
Topic #: 1
A crucial decision any company must make is in regard to where it hosts the data systems it depends on. A debate exists as to whether it’s best to lease space in a data center or build your own data center–and now with cloud computing, whether to purchase resources within a cloud.
What is the biggest advantage to leasing space in a data center versus procuring cloud services?
A. Regulations
B. Control
C. Security
D. Costs
Selected Answer: B
Question #: 263
Topic #: 1
Which of the following systems is used to employ a variety of different techniques to discover and alert on threats and potential threats to systems and networks?
A. IDS
B. IPS
C. Firewall
D. WAF
Selected Answer: A
Question #: 264
Topic #: 1
Which of the following is not a risk management framework?
A. COBIT
B. Hex GBL
C. ISO 31000:2009
D. NIST SP 800-37
Selected Answer: B
Question #: 265
Topic #: 1
In order to ensure ongoing compliance with regulatory requirements, which phase of the cloud data lifecycle must be tested regularly?
A. Archive
B. Share
C. Store
D. Destroy
Selected Answer: C
Question #: 266
Topic #: 1
Which of the following threat types involves leveraging a user’s browser to send untrusted data to be executed with legitimate access via the user’s valid credentials?
A. Injection
B. Missing function-level access control
C. Cross-site scripting
D. Cross-site request forgery
Selected Answer: D
Question #: 267
Topic #: 1
Digital investigations have adopted many of the same methodologies and protocols as other types of criminal or scientific inquiries.
What term pertains to the application of scientific norms and protocols to digital investigations?
A. Scientific
B. Investigative
C. Methodological
D. Forensics
Selected Answer: D
Question #: 268
Topic #: 1
Within a federated identity system, which entity accepts tokens from the identity provider?
A. Assertion manager
B. Servicing party
C. Proxy party
D. Relying party
Selected Answer: D
Question #: 269
Topic #: 1
Different types of audits are intended for different audiences, such as internal, external, regulatory, and so on.
Which of the following audits are considered “restricted use” versus being for a more broad audience?
A. SOC Type 2
B. SOC Type 1
C. SOC Type 3
D. SAS-70
Selected Answer: A
Question #: 270
Topic #: 1
Although host-based and network-based IDSs perform similar functions and have similar capabilities, which of the following is an advantage of a network-based
IDS over a host-based IDS, assuming all capabilities are equal?
A. Segregated from host systems
B. Network access
C. Scalability
D. External to system patching
Selected Answer: A
Question #: 271
Topic #: 1
DNSSEC was designed to add a layer of security to the DNS protocol.
Which type of attack was the DNSSEC extension designed to mitigate?
A. Account hijacking
B. Snooping
C. Spoofing
D. Data exposure
Selected Answer: C
Question #: 272
Topic #: 1
Which aspect of cloud computing pertains to cloud customers only paying for the resources and services they actually use?
A. Metered service
B. Measured billing
C. Metered billing
D. Measured service
Selected Answer: A
Question #: 273
Topic #: 1
Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.
Which of the following compromise the two facets of computing?
A. CPU and software
B. CPU and storage
C. CPU and memory
D. Memory and networking
Selected Answer: C
Question #: 274
Topic #: 1
With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?
A. Structured and unstructured
B. Structured and hierarchical
C. Volume and database
D. Volume and object
Selected Answer: A
Question #: 275
Topic #: 1
Firewalls are used to provide network security throughout an enterprise and to control what information can be accessed–and to a certain extent, through what means.
Which of the following is NOT something that firewalls are concerned with?
A. IP address
B. Encryption
C. Port
D. Protocol
Selected Answer: B
Question #: 276
Topic #: 1
Within an IaaS implementation, which of the following would NOT be a metric used to quantify service charges for the cloud customer?
A. Memory
B. Number of users
C. Storage
D. CPU
Selected Answer: B
Question #: 277
Topic #: 1
Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.
What type of attack is this?
A. Injection
B. Missing function-level access control
C. Cross-site scripting
D. Cross-site request forgery
Selected Answer: A
Question #: 278
Topic #: 1
For service provisioning and support, what is the ideal amount of interaction between a cloud customer and cloud provider?
A. Half
B. Full
C. Minimal
D. Depends on the contract
Selected Answer: C
Question #: 279
Topic #: 1
What does a cloud customer purchase or obtain from a cloud provider?
A. Services
B. Hosting
C. Servers
D. Customers
Selected Answer: A
Question #: 280
Topic #: 1
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
A. Use
B. Share
C. Store
D. Create
Selected Answer: D
Question #: 281
Topic #: 1
You were recently hired as a project manager at a major university to implement cloud services for the academic and administrative systems. Because the load and demand for services at a university are very cyclical in nature, commensurate with the academic calendar, which of the following aspects of cloud computing would NOT be a primary benefit to you?
A. Measured service
B. Broad network access
C. Resource pooling
D. On-demand self-service
Selected Answer: B
Question #: 282
Topic #: 1
Which cloud deployment model is MOST likely to offer free or very cheap services to users?
A. Hybrid
B. Community
C. Public
D. Private
Selected Answer: C
Question #: 283
Topic #: 1
Where is a DLP solution generally installed when utilized for monitoring data in transit?
A. Network perimeter
B. Database server
C. Application server
D. Web server
Selected Answer: A
Question #: 284
Topic #: 1
With IaaS, what is responsible for handling the security and control over the volume storage space?
A. Management plane
B. Operating system
C. Application
D. Hypervisor
Selected Answer: D
Question #: 285
Topic #: 1
Configurations and policies for a system can come from a variety of sources and take a variety of formats. Which concept pertains to the application of a set of configurations and policies that is applied to all systems or a class of systems?
A. Hardening
B. Leveling
C. Baselines
D. Standards
Selected Answer: C
Question #: 286
Topic #: 1
Which of the following tasks within a SaaS environment would NOT be something the cloud customer would be responsible for?
A. Authentication mechanism
B. Branding
C. Training
D. User access
Selected Answer: A
Question #: 287
Topic #: 1
An SLA contains the official requirements for contract performance and satisfaction between the cloud provider and cloud customer.
Which of the following would NOT be a component with measurable metrics and requirements as part of an SLA?
A. Network
B. Users
C. Memory
D. CPU
Selected Answer: B
Question #: 288
Topic #: 1
Within a federated identity system, which of the following would you be MOST likely to use for sending information for consumption by a relying party?
A. XML
B. HTML
C. WS-Federation
D. SAML
Selected Answer: D
Question #: 289
Topic #: 1
Which data state would be most likely to use digital signatures as a security protection mechanism?
A. Data in use
B. Data in transit
C. Archived
D. Data at rest
Selected Answer: B
Question #: 290
Topic #: 1
There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the stricter requirements.
Which US program was designed to help companies overcome these differences?
A. SOX
B. HIPAA
C. GLBA
D. Safe Harbor
Selected Answer: C
Question #: 291
Topic #: 1
Audits are either done based on the status of a system or application at a specific time or done as a study over a period of time that takes into account changes and processes.
Which of the following pairs matches an audit type that is done over time, along with the minimum span of time necessary for it?
A. SOC Type 2, one year
B. SOC Type 1, one year
C. SOC Type 2, one month
D. SOC Type 2, six months
Selected Answer: D
Question #: 292
Topic #: 1
With software-defined networking (SDN), which two types of network operations are segregated to allow for granularity and delegation of administrative access and functions?
A. Filtering and forwarding
B. Filtering and firewalling
C. Firewalling and forwarding
D. Forwarding and protocol
Selected Answer: A
Question #: 293
Topic #: 1
Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.
Which of the following is the optimal temperature range as set by ASHRAE?
A. 69.8 to 86.0 degrees Fahrenheit (21 to 30 degrees Celsius)
B. 51.8 to 66.2 degrees Fahrenheit (11 to 19 degrees Celsius)
C. 64.4 to 80.6 degrees Fahrenheit (18 to 27 degrees Celsius)
D. 44.6 to 60.8 degrees Fahrenheit (7 to 16 degrees Celsius)
Selected Answer: C
Question #: 294
Topic #: 1
Which of the following statements best describes a Type 1 hypervisor?
A. The hypervisor software runs within an operating system tied to the hardware.
B. The hypervisor software runs as a client on a server and needs an external service to administer it.
C. The hypervisor software runs on top of an application layer.
D. The hypervisor software runs directly on ג€bare metalג€ without an intermediary.
Selected Answer: D
Question #: 295
Topic #: 1
Which cloud storage type resembles a virtual hard drive and can be utilized in the same manner and with the same type of features and capabilities?
A. Volume
B. Unstructured
C. Structured
D. Object
Selected Answer: A
Question #: 296
Topic #: 1
Which aspect of SaaS will alleviate much of the time and energy organizations spend on compliance (specifically baselines)?
A. Maintenance
B. Licensing
C. Standardization
D. Development
Selected Answer: C
Question #: 297
Topic #: 1
Many tools and technologies are available for securing or monitoring data in transit within a data center, whether it is a traditional data center or a cloud.
Which of the following is NOT a technology for securing data in transit?
A. VPN
B. TLS
C. DNSSEC
D. HTTPS
Selected Answer: C
Question #: 298
Topic #: 1
With a federated identity system, where would a user perform their authentication when requesting services or application access?
A. Cloud provider
B. The application
C. Their home organization
D. Third-party authentication system
Selected Answer: C
Question #: 299
Topic #: 1
Where is an XML firewall most commonly and effectively deployed in the environment?
A. Between the application and data layers
B. Between the presentation and application layers
C. Between the IPS and firewall
D. Between the firewall and application server
Selected Answer: D
Question #: 300
Topic #: 1
Modern web service systems are designed for high availability and resiliency. Which concept pertains to the ability to detect problems within a system, environment, or application and programmatically invoke redundant systems or processes for mitigation?
A. Elasticity
B. Redundancy
C. Fault tolerance
D. Automation
Selected Answer: C