One of the main components of system audits is the ability to track changes over time and to match these changes with continued compliance and internal processes.
Which aspect of cloud computing makes this particular component more challenging than in a traditional data center? A. Portability B. Virtualization C. Elasticity D. Resource pooling
Correct Answer: B
Explanation:
Explanation: Cloud services make exclusive use of virtualization, and systems change over time, including the addition, subtraction, and
reimaging of virtual machines. It is extremely unlikely that the exact same virtual machines and images used in a previous audit would still be in use or even available for a later audit, making the tracking of changes over time extremely difficult, or even impossible. Elasticity refers to the ability to add and remove resources from a system or service to meet current demand, and although it plays a factor in making the tracking of virtual machines very difficult over time, it is not the best answer in this case. Resource pooling pertains to a cloud environment sharing a large amount of resources between different customers and services. Portability refers to the ability to move systems or services easily between different cloud providers.
Your boss has tasked your team with getting your legacy systems and applications connected with new cloud-based services that management has decided are crucial to customer service and offerings.
Which role would you be assuming under this directive? A. Cloud service administrator B. Cloud service user C. Cloud service integrator D. Cloud service business manager
Correct Answer: C
Explanation:
Explanation: The cloud service integrator role is responsible for connecting and integrating existing services and applications with cloud-based services.A cloud service administrator is responsible for testing, monitoring, and securing cloud services, as well as providing usage reporting and dealing with service problems. The cloud service user is someone who consumes cloud services. The cloud service business manager is responsible for overseeing the billing, auditing, and purchasing of cloud services.
What concept does the "D" represent with the STRIDE threat model? A. Data loss B. Denial of service C. Data breach D. Distributed
Correct Answer: B
Explanation:
Explanation: Any application can be a possible target of denial-of-service (DoS) attacks. From the application side, the developers should minimize how many operations are performed for non-authenticated users. This will keep the application running as quickly as possible and using the least amount of system resources to help minimize the impact of any such attacks.
Which of the cloud deployment models offers the most control and input to the cloud customer as to how the overall cloud environment is implemented and configured? A. Public B. Community C. Hybrid D. Private
Correct Answer: D
Explanation:
Explanation: A private cloud model, and the specific contractual relationships involved, will give a cloud customer the most level of input and control over how the overall cloud environment is designed and implemented. This would be even more so in cases where the private cloud is owned and operated by the same organization that is hosting services within it.
What is an often overlooked concept that is essential to protecting the confidentiality of data? A. Strong password B. Training C. Security controls D. Policies
Correct Answer: B
Explanation:
Explanation: While the main focus of confidentiality revolves around technological requirements or particular security methods, an important and often overlooked aspect of safeguarding data confidentiality is appropriate and comprehensive training for those with access to it. Training should be focused on the safe handling of sensitive information overall, including best practices for network activities as well as physical security of the devices or workstations used to access the application.
Over time, what is a primary concern for data archiving? A. Size of archives B. Format of archives C. Recoverability D. Regulatory changes
Correct Answer: C
Explanation:
Explanation: Over time, maintaining the ability to restore and read archives is a primary concern for data archiving. As technologies change and new systems are brought in, it is imperative for an organization to ensure they are still able to restore and access archives for the duration of the required retention period.
Which value refers to the percentage of production level restoration needed to meet BCDR objectives? A. RPO B. RTO C. RSL D. SRE
Correct Answer: C
Explanation:
Explanation: The recovery service level (RSL) is a percentage measure of the total typical production service level that needs to be restored to meet BCDR objectives in the case of a failure.
What process is used within a cloud environment to maintain resource balancing and ensure that resources are available where and when needed? A. Dynamic clustering B. Dynamic balancing C. Dynamic resource scheduling D. Dynamic optimization
Correct Answer: D
Explanation:
Explanation: Dynamic optimization is the process through which the cloud environment is constantly maintained to ensure resources are available when and where needed, and that physical nodes do not become overloaded or near capacity, while others are underutilized.
Which of the following service capabilities gives the cloud customer an established and maintained framework to deploy code and applications? A. Software B. Desktop C. Platform D. Infrastructure
Correct Answer: C
Explanation:
Explanation: The platform service capability provides programming languages and libraries from the cloud provider, where the customer can deploy their own code and applications into a managed and controlled framework.
What does static application security testing (SAST) offer as a tool to the testers? A. Production system scanning B. Injection attempts C. Source code access D. Live testing
Correct Answer: C
Explanation:
Explanation: Static application security testing (SAST) is conducted with knowledge of the system, including source code, and is done against offline systems.
Please disable your adblocker or whitelist this site!