Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?

A.

Testing

B.

Training

C.

Planning

D.

Coding

Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?

A.

Application isolation

B.

Type 1 hypervisor

C.

Application virtualization

D.

Type 2 hypervisor

Which tier from Uptime Institute's Data Center Site Infrastructure Tier Standards is considered to be the most secure, reliable, and redundant in design and operational elements?

A.

Tier IV

B.

Tier I

C.

Tier II

D.

Tier III

Which phase of the cloud data lifecycle implements the file, block, or object type of cloud architecture?

A.

Archive

B.

Store

C.

Create

D.

Share

Which data management activity is considered legal fair use of a copyrighted item?

A.

Reporting the work on the news

B.

Performing the work publicly

C.

Exporting the work

D.

Broadcasting the work

Which concept focuses on operating highly available workloads in the cloud?

A.

Resource hierarchy

B.

Security

C.

Operational excellence

D.

Reliability

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

A.

Emergency response team (ERT)

B.

Security operations center (SOC)

C.

Disaster response team (DRT)

D.

Network operations center (NOC)

When should a cloud service provider delete customer data?

A.

When the cloud provider oversubscribes its storage space

B.

When the data has not been accessed in the last 30 days

C.

After a scheduled data review

D.

After the specified retention period

Which cost is reduced by using software as a service (SaaS)?

A.

General costs of licensing

B.

Ongoing costs by utilizing a single vendor

C.

Energy costs with optimum use of IT resources

D.

Support costs for hardware and software

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication