Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which concept focuses on operating highly available workloads in the cloud?

A.

Resource hierarchy

B.

Security

C.

Operational excellence

D.

Reliability

What is the process of identifying and procuring stored data as evidence for legal purposes?

A.

Chain of custody

B.

Forensic imaging

C.

Electronic discovery

D.

Gap analysis

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

A.

Locks

B.

Cameras

C.

Bollards

D.

Fences

As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?

A.

Location-based

B.

Content-based

C.

Label-based

D.

Metadata-based

Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?

A.

Cases

B.

Stories

C.

Cookies

D.

Notes

Which term describes data elements that, when combined with other information, are used to single out an individual?

A.

Direct identifiers

B.

Data subjects

C.

Personal details

D.

Indirect identifiers

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

A.

On-path

B.

Injection

C.

Credential

D.

Denial-of-service

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?

A.

MAC addresses and protocols

B.

Ports and protocols

C.

Unique identifiers and protocols

D.

Definitions and protocols