Topic 2, Exam Pool B
The destruction of a cloud customer’s data can be required by all of the following except
___________.
Response:
A.
Statute
B.
Regulation
C.
The cloud provider’s policy
D.
Contract
The cloud provider’s policy
Federation should be __________ to the users.
Response:
A.
Hostile
B.
Proportional
C.
Transparent
D.
Expensive
Transparent
What is a cloud storage architecture that manages the data in a hierarchy of files?
Response:
A.
Object-based storage
B.
File-based storage
C.
Database
D.
CDN
File-based storage
You have been tasked by management to offload processing and validation of incoming
encoded data from your application servers and their associated APIs. Which of the
following would be the most appropriate device or software to consider?Response:
A.
XML accelerator
B.
XML firewall
C.
Web application firewall
D.
Firewall
XML accelerator
What is the most secure form of code testing and review?
Response:
A.
Open source
B.
Proprietary/internal
C.
Neither open source nor proprietary
D.
Combination of open source and proprietary
Combination of open source and proprietary
Page 36 out of 103 Pages |
Previous |