Which of the following APIs are most commonly used within a cloud environment? A. REST and SAML B. SOAP and REST C. REST and XML D. XML and SAML
Correct Answer: B
Explanation:
Explanation: Simple Object Access Protocol (SOAP) and Representational State Transfer (REST) are the most commonly used APIs within a cloud environment. Extensible Markup Language (XML) and Security Assertion Markup Language (SAML) are both standards for exchanging encoded data between two parties, with XML being for more general use and SAML focused on authentication and authorization data.
Which aspect of cloud computing will be most negatively impacted by vendor lock-in? A. Elasticity B. Reversibility C. Interoperability D. Portability
Correct Answer: D
Explanation:
Explanation: A cloud customer utilizing proprietary APIs or services from one cloud provider that are unlikely to be available from another cloud provider will most negatively impact portability.
Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment? A. Dedicated switches B. Trust zones C. Redundant network circuits D. Direct connections
Correct Answer: B
Explanation:
Explanation: Trust zones can be implemented to separate systems or tiers along logical lines for great security and access controls. Each zone can then have its own security controls and monitoring based on its particular needs.
What is the biggest benefit to leasing space in a data center versus building or maintain your own? A. Certification B. Costs C. Regulation D. Control
Correct Answer: B
Explanation:
Explanation: When leasing space in a data center, an organization can avoid the enormous startup and building costs associated with a data center, and can instead leverage economies of scale by grouping with other organizations and sharing costs.
Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union? A. GLBA B. HIPAA C. Safe Harbor D. SOX
Correct Answer: C
Explanation:
Explanation: Due to the lack of an adequate privacy law or protection at the federal level in the United States, European privacy regulations generally prohibit the exporting or sharing of PII from Europe with the United States. Participation in the Safe Harbor program is voluntary on behalf of an organization, but it does require them to conform to specific requirements and policies that mirror those from the EU. Thus, organizations can fulfill requirements for data sharing and export and possibly serve customers in the EU.
Which protocol does the REST API depend on? A. HTTP B. XML C. SAML D. SSH
Correct Answer: A
Explanation:
Explanation: Representational State Transfer (REST) is a software architectural scheme that applies the components, connectors, and data conduits for many web applications used on the Internet. It uses and relies on the HTTP protocol and supports a variety of data formats.
Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions? A. Cloud service manager B. Cloud service deployment C. Cloud service business manager D. Cloud service operations manager
Correct Answer: C
Explanation:
Explanation: The cloud service business manager is responsible for overseeing business plans and customer relationships as well as processing financial transactions.
Which of the following storage types is most closely associated with a database-type storage implementation? A. Object B. Unstructured C. Volume D. Structured
Correct Answer: D
Explanation:
Explanation: Structured storage involves organized and categorized data, which most closely resembles and operates like a database system would.
What type of masking strategy involves making a separate and distinct copy of data with masking in place? A. Dynamic B. Replication C. Static D. Duplication
Correct Answer: C
Explanation:
Explanation: With static masking, a separate and distinct copy of the data set is created with masking in place. This is typically done through a script or other process that takes a standard data set, processes it to mask the appropriate and predefined fields, and then outputs the data set as a new one with the completed masking done.
Which United States law is focused on accounting and financial practices of organizations? A. Safe Harbor B. GLBA C. SOX D. HIPAA
Correct Answer: C
Explanation:
Explanation: The Sarbanes-Oxley (SOX) Act is not an act that pertains to privacy or IT security directly, but rather regulates accounting and financial practices used by organizations. It was passed to protect stakeholders and shareholders from improper practices and errors, and it sets forth rules for compliance, regulated and enforced by the Securities and Exchange Commission (SEC). The main influence on IT systems and operations is the requirements it sets for data retention, specifically in regard to what types of records must be preserved and for how long.
Please disable your adblocker or whitelist this site!