Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following roles is responsible for obtaining new customers and securing contracts and agreements?

A.

Inter-cloud provider

B.

Cloud service broker

C.

Cloud auditor

D.

Cloud service developer

Which of the following storage types is most closely associated with a database-type storage implementation?

A.

Object

B.

Unstructured

C.

Volume

D.

Structured

Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment?

A.

Dedicated switches

B.

Trust zones

C.

Redundant network circuits

D.

Direct connections

Which of the following is the optimal temperature for a data center, per the guidelines established by the America Society of Heating, Refrigeration, and Air Conditioning Engineers (ASHRAE)?

A.

69.8-86.0degF (21-30degC)

B.

64.4-80.6degF(18-27degC)

C.

51.8-66.2degF(11-19degC)

D.

44.6-60-8degF(7-16degC)

What is the biggest negative to leasing space in a data center versus building or maintain your own?

A.

Costs

B.

Control

C.

Certification

D.

Regulation

Which term relates to the application of scientific methods and practices to evidence?

A.

Forensics

B.

Methodical

C.

Theoretical

D.

Measured

What type of PII is controlled based on laws and carries legal penalties for noncompliance with requirements?

A.

Contractual

B.

Regulated

C.

Specific

D.

Jurisdictional

Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?

A.

A Type 1 hypervisor also controls patching of its hosted virtual machines ensure they are always secure.

B.

A Type 1 hypervisor is tied directly to the bare metal and only runs with code necessary to perform its specific mission.

C.

A Type 1 hypervisor performs hardware-level encryption for tighter security and efficiency.

D.

A Type 1 hypervisor only hosts virtual machines with the same operating systems as the hypervisor.

Which of the following storage types is most closely associated with a traditional file system and tree structure?

A.

Volume

B.

Unstructured

C.

Object

D.

Structured

Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?

A.

VPN

B.

WAF

C.

IPSec

D.

HTTPS

What is the only data format permitted with the SOAP API?

A.

HTML

B.

SAML

C.

XSML

D.

XML

Which of the following is NOT a criterion for data within the scope of eDiscovery?

A.

Possession

B.

Custody

C.

Control

D.

Archive

Which aspect of archiving must be tested regularly for the duration of retention requirements?

A.

Availability

B.

Recoverability

C.

Auditability

D.

Portability

Which of the following roles is responsible for gathering metrics on cloud services and managing cloud deployments and the deployment processes?

A.

Cloud service business manager

B.

Cloud service operations manager

C.

Cloud service manager

D.

Cloud service deployment manager

Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union?

A.

GLBA

B.

HIPAA

C.

Safe Harbor

D.

SOX