Topic 1: Exam Pool A
The cloud deployment model that features organizational ownership of the hardware and
infrastructure, and usage only by members of that organization, is known as:
Response:
A.
Private
B.
Public
C.
Hybrid
D.
Motive
Private
Using one cloud provider for your operational environment and another for your
BCDR backup will also give you the additional benefit of ____________.
Response:
A.
Allowing any custom VM builds you use to be instantly ported to another environment
B.
Avoiding vendor lock-in/lockout
C.
Increased performance
D.
Lower cost
Avoiding vendor lock-in/lockout
The Transport Layer Security (TLS) protocol creates a secure communications channel
over public media (such as the Internet). In a typical TLS session, what is the usual means
for establishing trust between the parties?
Response:
A.
Out-of-band authentication
B.
Multifactor authentication
C.
PKI certificates
D.
Preexisting knowledge of each other
PKI certificates
Vulnerability scans are dependent on ________ in order to function.
Response:
A.
Privileged access
B.
Vulnerability signatures
C.
Malware libraries
D.
Forensic analysis
Vulnerability signatures
Different types of cloud deployment models use different types of storage from
traditional data centers, along with many new types of software platforms for
deploying applications and configurations. Which of the following is NOT a storage
type used within a cloud environment?
A.
Docker
B.
Object
C.
Structured
D.
Volume
Docker
Page 22 out of 103 Pages |
Previous |