ANSWERS RATED A+
✔✔"Which data retention method is stored with a minimal amount of metadata storage
with the content?
(A) File system
(B) Redundant array
(C) Block-based
(D) Object-based" - ✔✔Block-based
✔✔"What is a key capability of security information and event management?
(A) Secure remote access
(B) Intrusion prevention capabilities
(C) Automatic remediation of issues
(D) Centralized collection of log data" - ✔✔Centralized collection of log data
✔✔"Which data source provides auditability and traceability for event investigation as
well as documentation?
(A) Storage files
(B) Packet capture
(C) Database tables
(D) Network interference" - ✔✔Packet Capture
✔✔"Which data source provides auditability and traceability for event investigation as
well as documentation?
(A) Database schema
(B) Ephemeral storage
(C) Network segmentation
(D) Virtualization platform logs" - ✔✔Virtualization platform logs
✔✔"Which technology is used to manage identity access management by building trust
relationships between organizations?
(A) Federation
(B) Single sign-on
(C) Biometric authentication
(D) Multifactor authentication" - ✔✔Federation
✔✔"Which term describes the action of confirming identity access to an information
system?
(A) Access
(B) Concept
(C) Coordination
(D) Authentication" - ✔✔Authentication
,✔✔"Which cloud computing tool is used to discover internal use of cloud services using
various mechanisms such as network monitoring?
(A) Data loss prevention (DLP)
(B) Web application ?rewall (WAF)
(C) Content delivery network (CDN)
(D) Cloud access security broker (CASB)" - ✔✔Cloud access security broker (CASB)
✔✔"Which cloud computing technology unlocks business value through digital and
physical access to maps?
(A) Multitenancy
(B) Cloud application
(C) On-demand self-service
(D) Application programming interface" - ✔✔Application Programming interface
✔✔"Which cloud computing tool may help detect data migrations to cloud services?
(A) Cloud data transfer
(B) Data loss prevention
(C) Cloud security gateways
(D) Uniform resource locator (URL) Filtering" - ✔✔(B) Data loss prevention
✔✔"What is a key component of the infrastructure as a service (IaaS) cloud service
model?
(A) High reliability and resilience
(B) Allows choice and reduces lock-in
(C) Ease of use and limited administration
(D) Supports multiple languages and frameworks" - ✔✔High reliability and resilience
✔✔"What is a key capability of infrastructure as a service (IaaS)?
(A) Multiple hosting environments
(B) Hosted application management
(C) Converged network and IT capacity pool
(D) Leased application and software licensing" - ✔✔Converged network and IT capacity
pool
✔✔"Which option should an organization choose if there is a need to avoid software
ownership?
(A) Software as a service (SaaS)
(B) Platform as a service (PaaS)
(C) Containers as a service (CaaS)
(D) Infrastructure as a service (IaaS)" - ✔✔Software as a service (SaaS)
✔✔"Which cloud model offers access to a pool of fundamental IT resources such as
computing, networking, or storage?
(A) Data
, (B) Platform
(C) Application
(D) Infrastructure" - ✔✔Infrastructure
✔✔"In which situation could cloud clients find it impossible to recover or access their
own data if their cloud provider goes bankrupt?
(A) Multicloud
(B) Multitenant
(C) Vendor lock-in
(D) Vendor lock-out" - ✔✔Vendor lock-out
✔✔"Which cloud deployment model is operated for a single organization?
(A) Private
(B) Public
(C) Hybrid
(D) Consortium" - ✔✔Private
✔✔"Which cloud model provides data location assurance?
(A) Hybrid
(B) Public
(C) Private
(D) Community" - ✔✔Private
✔✔"Which cloud model allows the consumer to have sole responsibility for
management and governance?
(A) Hybrid
(B) Public
(C) Private
(D) Community" - ✔✔Private
✔✔"Which technology allows an organization to control access to sensitive documents
stored in the cloud?
(A) Digital rights management (DRM)
(B) Database activity monitoring (DAM)
(C) Identity and access management (IAM)
(D) Distributed resource scheduling (DRS)" - ✔✔Digital Rights Management (DRM)
✔✔"Which security technology can provide secure network communications from on-
site enterprise systems to a cloud platform?
(A) Web application ?rewall (WAF)
(B) Data loss prevention (DLP)
(C) Domain name system security extensions (DNSSEC)
(D) Internet protocol security (IPSec) virtual private network (VPN)" - ✔✔Internet
protocol security (IPSec) virtual private network (VPN