Topic 1: Exam Pool A
The use of which of the following technologies will NOT require the security
dependency of an operating system, other than its own?
A.
Management plane
B.
Type 1 hypervisor
C.
Type 2 hypervisor
D.
Virtual machine
Type 1 hypervisor
Which of the following is characterized by a set maximum capacity?
Response:
A.
A secret-sharing-made-short (SSMS) bit-splitting implementation
B.
A tightly coupled cloud storage cluster
C.
A loosely coupled cloud storage cluster
D.
A public-key infrastructure
A tightly coupled cloud storage cluster
Which of the following is a possible negative aspect of bit-splitting?
A.
Greater chance of physical theft of assets
B.
Loss of public image
C.
Some risk to availability, depending on the implementation
D.
A small fire hazard
Some risk to availability, depending on the implementation
What sort of legal enforcement may the Payment Card Industry (PCI) Security
Standards Council not bring to bear against organizations that fail to comply with
the Payment Card Industry Data Security Standard (PCI DSS)?
Response:
A.
Fines
B.
Jail time
C.
Suspension of credit card processing privileges
D.
Subject to increased audit frequency and scope
Jail time
Each of the following are dependencies that must be considered when reviewing the
BIA after cloud migration except:
Response:
A.
The cloud provider’s suppliers
B.
The cloud provider’s vendors
C.
The cloud provider’s utilities
D.
The cloud provider’s resellers
The cloud provider’s resellers
Page 5 out of 103 Pages |
Previous |