Which attribute of data poses the biggest challenge for data discovery? A. Labels B. Quality C. Volume D. Format
Correct Answer: B
Explanation:
Explanation: The main problem when it comes to data discovery is the quality of the data that analysis is being performed against. Data that is malformed, incorrectly stored or labeled, or incomplete makes it very difficult to use analytical tools against.
What concept does the "A" represent in the DREAD model? A. Affected users B. Authentication C. Affinity D. Authorization
Correct Answer: A
Explanation:
Explanation: Affected users refers to the percentage of users who would be impacted by a successful exploit. Scoring ranges from 0, which means no users are impacted, to 10, which means all users are impacted.
Which of the following technologies is used to monitor network traffic and notify if any potential threats or attacks are noticed? A. IPS B. WAF C. Firewall D. IDS
Correct Answer: D
Explanation:
Explanation: An intrusion detection system (IDS) is designed to analyze network packets, compare their contents or characteristics against a set of configurations or signatures, and alert personnel if anything is detected that could constitute a threat or is otherwise designated for alerting.
Which of the cloud deployment models offers the easiest initial setup and access for the cloud customer? A. Hybrid B. Community C. Private D. Public
Correct Answer: D
Explanation:
Explanation: Because the public cloud model is available to everyone, in most instances all a customer will need to do to gain access is set up an account and provide a credit card number through the service’s web portal. No additional contract negotiations, agreements, or specific group memberships are typically needed to get started.
Which aspect of cloud computing would make the use of a cloud the most attractive as a BCDR solution? A. Interoperability B. Resource pooling C. Portability D. Measured service
Correct Answer: D
Explanation:
Explanation: Measured service means that costs are only incurred when a cloud customer is actually using cloud services. This is ideal for a business continuity and disaster recovery (BCDR) solution because it negates the need to keep hardware or resources on standby in case of a disaster. Services can be initiated when needed and without costs unless needed.
Which of the following is NOT part of a retention policy? A. Format B. Costs C. Accessibility D. Duration
Correct Answer: B
Explanation:
Explanation: The data retention policy covers the duration, format, technologies, protection, and accessibility of archives, but does not address the specific costs of its implementation and maintenance.
Other than cost savings realized due to measured service, what is another facet of cloud computing that will typically save substantial costs in time and money for an organization in the event of a disaster? A. Broad network access B. Interoperability C. Resource pooling D. Portability
Correct Answer: A
Explanation:
Explanation: With a typical BCDR solution, an organization would need some number of staff to quickly travel to the location of the BCDR site to configure systems and applications for recovery. With a cloud environment, everything is done over broad network access, with no need (or even possibility) to travel to a remote site at any time.
What is the minimum regularity for testing a BCDR plan to meet best practices? A. Once year B. Once a month C. Every six months D. When the budget allows it
Correct Answer: A
Explanation:
Explanation: Best practices and industry standards dictate that a BCDR solution should be tested at least once a year, though specific regulatory requirements may dictate more regular testing. The BCDR plan should also be tested whenever a major modification to a system occurs.
Who would be responsible for implementing IPsec to secure communications for an application? A. Developers B. Systems staff C. Auditors D. Cloud customer
Correct Answer: B
Explanation:
Explanation: Because IPsec is implemented at the system or network level, it is the responsibility of the systems staff. IPsec removes the responsibility from developers, whereas other technologies such as TLS would be implemented by developers.
Please disable your adblocker or whitelist this site!