Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

If a key feature of cloud computing that your organization desires is the ability to scale and expand without limit or concern about available resources, which cloud deployment model would you MOST likely be considering?

A.

Public

B.

Hybrid

C.

Private

D.

Community

Different certifications and standards take different approaches to data center design and operations. Although many traditional approaches use a tiered methodology, which of the following utilizes a macro-level approach to data center design?

A.

IDCA

B.

BICSI

C.

Uptime Institute

D.

NFPA

Which of the following is not a risk management framework?

A.

COBIT

B.

Hex GBL

C.

ISO 31000:2009

D.

NIST SP 800-37

There is a large gap between the privacy laws of the United States and those of the European Union. Bridging this gap is necessary for American companies to do business with European companies and in European markets in many situations, as the American companies are required to comply with the stricter requirements.

Which US program was designed to help companies overcome these differences?

A.

SOX

B.

HIPAA

C.

GLBA

D.

Safe Harbor

Different types of audits are intended for different audiences, such as internal, external, regulatory, and so on.

Which of the following audits are considered "restricted use" versus being for a more broad audience?

A.

SOC Type 2

B.

SOC Type 1

C.

SOC Type 3

D.

SAS-70

The share phase of the cloud data lifecycle involves allowing data to leave the application, to be shared with external systems, services, or even other vendors/contractors.

What technology would be useful for protecting data at this point?

A.

IDS

B.

DLP

C.

IPS

D.

WAF

With a cloud service category where the cloud customer is provided a full application framework into which to deploy their code and services, which storage types are MOST likely to be available to them?

A.

Structured and unstructured

B.

Structured and hierarchical

C.

Volume and database

D.

Volume and object

Which of the following is considered an internal redundancy for a data center?

A.

Power feeds

B.

Chillers

C.

Network circuits

D.

Generators

Along with humidity, temperature is crucial to a data center for optimal operations and protection of equipment.

Which of the following is the optimal temperature range as set by ASHRAE?

A.

69.8 to 86.0 degrees Fahrenheit (21 to 30 degrees Celsius)

B.

51.8 to 66.2 degrees Fahrenheit (11 to 19 degrees Celsius)

C.

64.4 to 80.6 degrees Fahrenheit (18 to 27 degrees Celsius)

D.

44.6 to 60.8 degrees Fahrenheit (7 to 16 degrees Celsius)

Implementing baselines on systems would take an enormous amount of time and resources if the staff had to apply them to each server, and over time, it would be almost impossible to keep all the systems in sync on an ongoing basis.

Which of the following is NOT a package that can be used for implementing and maintaining baselines across an enterprise?

A.

Puppet

B.

SCCM

C.

Chef

D.

GitHub

Many of the traditional concepts of systems and services for a traditional data center also apply to the cloud. Both are built around key computing concepts.

Which of the following compromise the two facets of computing?

A.

CPU and software

B.

CPU and storage

C.

CPU and memory

D.

Memory and networking

Data centers have enormous power resources that are distributed and consumed throughout the entire facility.

Which of the following standards pertains to the proper fire safety standards within that scope?

A.

IDCA

B.

BICSI

C.

NFPA

D.

Uptime Institute

What type of solution is at the core of virtually all directory services?

A.

WS

B.

LDAP

C.

ADFS

D.

PKI

Data labels could include all the following, except:

A.

Data value

B.

Data of scheduled destruction

C.

Date data was created

D.

Data owner

Which of the following best describes the Organizational Normative Framework (ONF)?

A.

A set of application security, and best practices, catalogued and leveraged by the organization

B.

A container for components of an application’s security, best practices catalogued and leveraged by the organization

C.

A framework of containers for some of the components of application security, best practices, catalogued and leveraged by the organization

D.

A framework of containers for all components of application security, best practices, catalogued and leveraged by the organization.