Topic 1: Exam Pool A
Which strategy involves using a fake production system to lure attackers in order to
learn about their tactics?
Response:
A.
A. IDS
B.
B. Honeypot
C.
IPS
D.
Firewall
What is the federal agency that accepts applications for new patents?
A.
USDA
B.
USPTO
C.
OSHA
D.
SEC
Which of the following is a method for apportioning resources that involves setting
guaranteed minimums for all tenants/customers within the environment?
Response:
A.
Reservations
B.
Shares
C.
Cancellations
D.
Limits
Which of the following contract terms most incentivizes the cloud provider to meet the
requirements listed in the SLA?
Response:
A.
Regulatory oversight
B.
Financial penalties
C.
Performance details
D.
Desire to maintain customer satisfaction
You are the security director for a chain of automotive repair centers across several states.
Your company uses a cloud SaaS provider, for business functions that cross several of the
locations of your facilities, such as: 1) ordering parts 2) logistics and inventory 3) billing,
and 4) marketing.
The manager at one of your newest locations reports that there is a competing car repair
company that has a logo that looks almost exactly like the one your company uses. What
will most likely affect the determination of who has ownership of the logo?
Response:
A.
Whoever first used the logo
B.
The jurisdiction where both businesses are using the logo simultaneously
C.
Whoever first applied for legal protection of the logo
D.
Whichever entity has the most customers that recognize the logo
Page 25 out of 103 Pages |
Previous |