Topic 2, Exam Pool B
What could be the result of failure of the cloud provider to secure the hypervisor in such a
way that one user on a virtual machine can see the resource calls of another user’s virtual
machine?
Response:
A.
Unauthorized data disclosure
B.
Inference attacks
C.
Social engineering
D.
Physical intrusion
Your organization is developing software for wide use by the public. You have decided to
test it in a cloud environment, in a PaaS model. Which of the following should be of
particular concern to your organization for this situation?
Response:
A.
Vendor lock-in
B.
Backdoors
C.
Regulatory compliance
D.
High-speed network connectivity
Tokenization requires at least ____ database(s).
Response:
A.
One
B.
Two
C.
Three
D.
Four
Which of the following is the correct name for Tier II of the Uptime Institute Data Center
Site Infrastructure Tier Standard Topology?
Response:
A.
Concurrently Maintainable Site Infrastructure
B.
Fault-Tolerant Site Infrastructure
C.
Basic Site Infrastructure
D.
Redundant Site Infrastructure Capacity Components
You are the security manager of a small firm that has just purchased a DLP solution to
implement in your cloud-based production environment.
Which of these activities should you perform before deploying the tool?
Response:
A.
Survey your company’s departments about the data under their control
B.
Reconstruct your firewalls
C.
Harden all your routers
D.
Adjust the hypervisors
Page 30 out of 103 Pages |
Previous |