Q: 1
Aidan McGraw is a cloud security engineer in a multinational company. In 2018, his organization
deployed its workloads and data in a cloud environment. Aidan was given the responsibility of
securing high-valued information that needs to be shared outside the organization from
unauthorized intruders and hackers. He would like to protect sensitive information about his
organization, which will be shared outside the organization, from attackers by encrypting the data
and including user permissions inside the file containing this information. Which technology satisfies
Aidan's requirements?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
FinTech Inc. is an IT company that utilizes a cloud platform to run its IT infrastructure. Employees
belonging to various departments do not implement the rules and regulations framed by the IT
department, which leads to fragmented control and breaches that affect the efficiency of cloud
services. How can the organization effectively overcome shadow IT and unwarranted usage of cloud
resources in this scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Teresa Ruiz works as a cloud security engineer in an IT company. In January 2021, the data deployed
by her in the cloud environment was corrupted, which caused a tremendous loss to her organization.
Therefore, her organization changed its cloud service provider. After deploying the workload and
data in the new service provider's cloud environment, Teresa backed up the entire data of her
organization. A new employee, Barbara Houston, who recently joined Teresa's organization as a
cloud security engineer, only backed up those files that changed since the last executed backup.
Which type of backup was performed by Barbara in the cloud?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
CyTech Private Ltd. is an IT company located in Jacksonville. Florid
a. The organization would like to eliminate a single point of failure: therefore. In 2017. the
organization adopted a cloud computing service model in which the cloud service provider
completely handles the failover. CyTech Private Ltd. added automated failover capabilities to its
cloud environment and it has boon testing the functionality to ensure that it is working efficiently. In
which of the following cloud computing service models, failover is completely handled by the cloud
service provider?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
An Azure subscription owner, Arial Solutions, gets notified by Microsoft (by default} when a high-
severity alert (email notification) is triggered. The cloud security engineer would like to send these
security alerts to a specific Individual or anyone with particular Azure roles for a subscription, and
modify the severity levels for which alerts are sent. How con the cloud security engineer configure
these alerts?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Michael Keaton has been working as a cloud security specialist in a multinational company. His
organization uses Google Cloud. Keaton has launched an application in nl-standard-1 (1 vCPU, 3.75
GB memory) instance.
Over the past three weeks, the instance has had low memory utilization. Which of the following
machine type
switching is recommended for Keaton?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Cosmic IT Services wants to migrate to cloud computing. Before migrating to the cloud, the
organization must set business goals for cloud computing as per the guidelines of a standard IT
governance body. Which standard IT governance body can help the organization to set business goals
and objectives for cloud computing by offering the IT governance named COBIT (Control Objective
for Information and Related Technology)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Veronica Lauren has an experience of 4 years as a cloud security engineer. Recently, she joined an IT
company as a senior cloud security engineer. In 2010, her organization became a victim of a
cybersecurity attack in which the attacker breached her organization's cloud security perimeter and
stole sensitive information. Since then, her organization started using Google cloud-based services
and migrated the organizational workload and data in the Google cloud environment. Veronica
would like to detect security breaches in her organization's cloud security perimeter. Which of the
following built-in service of Google Security Command Center can help Veronica in monitoring her
organization's cloud logging stream and collect logs from one or multiple projects to detect security
breaches such as the presence of malware, brute force SSH attempts, and cryptomining?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
An organization uses AWS for its operations. It is observed that the organization's EC2 instance is
communicating with a suspicious port. Forensic investigators need to understand the patterns of the
current security breach. Which log source on the AWS platform can provide investigators with data of
evidentiary value during their investigation?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
A document has an organization's classified information. The organization's Azure cloud
administrator has to send it to different recipients. If the email is not protected, this can be opened
and read by any user. So the document should be protected and it will only be opened by authorized
users. In this scenario, which Azure service can enable the admin to share documents securely?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2