Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following industry standards mentions that credit card data must not be exchanged or stored in cleartext?

A.

CSA

B.

GDPR

C.

SOC2

D.

PCI-DSS

An organization's security policy states that software applications should not exchange sensitive data in cleartext. The security analyst is concerned about a software application that uses Base64 to encode credit card data. Which of the following would be the best algorithm to replace Base64?

A.

3DES

B.

AES

C.

RC4

D.

SHA-3

An organization is hosting a seminar with eight individuals who need to connect to their own dedicated VM. The technician used the following VM configurations:

IP address: DHCP

NIC: 1Gbps

Network: 10.1.10.0/29

Several users are unable to access their VMs. Which of the following best describes the reason?

A.

Not enough addresses are available.

B.

The routes are misconfigured.

C.

Too much traffic is on the network.

D.

DHCP is not working correctly on the VM.

A company's man web application is no longer accessible via the internet. The cloud administrator investigates and discovers the application is accessible locally and only via an IP access. Which of the following was misconfigured?

A.

IP

B.

DHCP

C.

NAT

D.

DNS

A company just learned that the data in its object storage was accessed by an unauthorized party. Which of the following should the company have done to make the data unusable?

A.

The company should have switched from object storage to file storage.

B.

The company should have hashed the data.

C.

The company should have changed the file access permissions.

D.

The company should have encrypted the data at rest.

A manager wants information about which users signed in to a certain VM during the past month. Which of the following can the cloud administrator use to obtain this information?

A.

Retention

B.

Alerting

C.

Aggregation

D.

Collection

A company's website suddenly crashed. A cloud engineer investigates the following logs:

Which of the following is the most likely cause of the issue?

A.

SQL injection

B.

Cross-site scripting

C.

Leaked credentials

D.

DDoS

A cloud engineer is designing a cloud-native, three-tier application. The engineer must adhere to the following security best practices:

• Minimal services should run on all layers of the stack.

• The solution should be vendor agnostic.

• Virealization could be used over physical hardware.

Which of the following concepts should the engineer use to design the system to best meet these requirements?

A.

Virtual machine

B.

Micro services

C.

Fan-out

D.

Cloud-provided managed services

Which of the following cloud deployment models is the best way to replicate a workload non-disruptively between on-premises servers and a public cloud?

A.

Public

B.

Community

C.

Private

D.

Hybrid

A customer is migrating applications to the cloud and wants to grant authorization based on the classification levels of each system. Which of the following should the customer implement to ensure authorisation to systems is granted when the user and system classification properties match? (Select two).

A.

Resource tagging

B.

Discretionary access control

C.

Multifactor authentication

D.

Role-based access control

E.

Token-based authentication

F.

Bastion host