Which of the following is NOT a function performed by the handshake protocol of TLS? A. Key exchange B. Encryption C. Negotiation of connection D. Establish session ID
Correct Answer: B
Explanation:
Explanation: The handshake protocol negotiates and establishes the connection as well as handles the key exchange and establishes the session ID. It does not perform the actual encryption of data packets.
What process is used within a clustered system to provide high availability and load balancing? A. Dynamic balancing B. Dynamic clustering C. Dynamic optimization D. Dynamic resource scheduling
Correct Answer: D
Explanation:
Explanation: Dynamic resource scheduling (DRS) is used within all clustering systems as the method for clusters to provide high availability, scaling, management, and workload distribution and balancing of jobs and processes. From a physical infrastructure perspective, DRS is used to balance compute loads between physical hosts in a cloud to maintain the desired thresholds and limits on the physical hosts.
Which of the following is the sole responsibility of the cloud customer, regardless of which cloud model is used? A. Infrastructure B. Platform C. Application D. Data
Correct Answer: D
Explanation:
Explanation: Regardless of which cloud-hosting model is used, the cloud customer always has sole responsibility for the data and its security.
Which of the following is NOT a focus or consideration of an internal audit? A. Certification B. Design C. Costs D. Operational efficiency
Correct Answer: A
Explanation:
Explanation: In order to obtain and comply with certifications, independent external audits must be performed and satisfied. Although some testing of certification controls can be part of an internal audit, they will not satisfy requirements.
From a security perspective, which of the following is a major concern when evaluating possible BCDR solutions? A. Access provisioning B. Auditing C. Jurisdictions D. Authorization
Correct Answer: C
Explanation:
Explanation: When a security professional is considering cloud solutions for BCDR, a top concern is the jurisdiction where the cloud systems are hosted. If the jurisdiction is different from where the production systems are hosted, they may be subjected to different regulations and controls, which would make a seamless BCDR solution far more difficult.
Which type of testing uses the same strategies and toolsets that hackers would use? A. Penetration B. Dynamic C. Static D. Malicious
Correct Answer: A
Explanation:
Explanation: Penetration testing involves using the same strategies and toolsets that hackers would use against a system to discovery potential vulnerabilities.
What must SOAP rely on for security? A. Encryption B. Tokenization C. TLS D. SSL
Correct Answer: A
Explanation:
Explanation: Simple Object Access Protocol (SOAP) uses Extensible Markup Language (XML) for passing data, and it must rely on the encryption of those data packages for security.
Which value refers to the amount of data an organization would need to recover in the event of a BCDR situation in order to reach an acceptable level of operations? A. SRE B. RTO C. RPO D. RSL
Correct Answer: C
Explanation:
Explanation: The recovery point objective (RPO) is defined as the amount of data a company would need to maintain and recover in order to function at a level acceptable to management. This may or may not be a restoration to full operating capacity, depending on what management deems as crucial and essential.
Please disable your adblocker or whitelist this site!