Q: 11
Which of the following actions will NOT make data part of the "create" phase of the cloud data
lifecycle?
Options
Discussion
Not B, it's actually A. Modifying metadata can be a trap since it changes properties not the actual data itself.
Nicely worded question, A is right.
Be respectful. No spam.
Q: 12
What is the minimum regularity for testing a BCDR plan to meet best practices?
67/315
Options
Discussion
A is correct. Monthly and every six months are overkill for most orgs, budget-based isn’t best practice. Seen similar Qs in other certs, annual’s the baseline. Let me know if you think otherwise.
A imo, annual BCDR plan testing pops up a lot in practice tests and exam reports too.
Be respectful. No spam.
Q: 13
You are designing the logical layout of a secure data center for a large enterprise that uses a multi-
tenant architecture. Your objective is to ensure strict tenant partitioning and robust access control to
prevent unauthorized access and data leakage between tenants. Which of the following measures would
be most effective in ensuring tenant partitioning and access control in a multi-tenant environment?
Options
Discussion
D. This was in my CCSP practice questions, VLANs are the go-to for tenant isolation in multi-tenant setups. Confident here.
D
Be respectful. No spam.
Q: 14
Your organization is planning to outsource its data processing functions to a cloud service provider. The
organization requires guarantees for data availability and performance. You are responsible for ensuring
that these guarantees are legally binding and enforceable. Which document should you focus on to
ensure that data availability and performance requirements are legally binding and enforceable?
Options
Discussion
Option A, Seen similar in exam reports, SLA is the doc that locks in those service levels for availability and performance.
Be respectful. No spam.
Q: 15
Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?
Options
Discussion
Probably B. Type 1 runs right on the hardware, so way less attack surface compared to Type 2 since it doesn't rely on a full OS underneath. Type 2 is more exposed because if the host OS is compromised, so are the VMs. Seen similar wording in a practice exam. Anyone see it different?
Be respectful. No spam.
Q: 16
What is a key capability or characteristic of PaaS?
Options
Discussion
Call it D. Manual scaling sounds more like a PaaS feature to me.
Be respectful. No spam.
Q: 17
Which phase of the cloud data lifecycle represents the first instance where security controls can be
implemented?
Options
Discussion
D
Be respectful. No spam.
Q: 18
A multinational corporation's cloud infrastructure is vulnerable to newly discovered threats. The company
needs to ensure that all its systems, including virtual machines and applications, are up-to-date with the
latest security patches. What is the most effective patch management strategy?
Options
Discussion
C
Automated patch management is way better for big companies, especially when you're dealing with cloud and lots of endpoints. Manual updates (A) or relying on users (B) just isn't scalable or reliable. Automation helps keep everything current and reduces human errors. Pretty sure this is what most orgs go with for cloud security. Agree?
Automated patch management is way better for big companies, especially when you're dealing with cloud and lots of endpoints. Manual updates (A) or relying on users (B) just isn't scalable or reliable. Automation helps keep everything current and reduces human errors. Pretty sure this is what most orgs go with for cloud security. Agree?
Be respectful. No spam.
Q: 19
Which of the following concepts refers to a cloud customer paying only for the resources and
offerings they use within a cloud environment, and only for the duration that they are consuming
them?
Options
Discussion
Option D makes sense to me since "metered service" sounds like paying by use. Saw this phrasing a few times in practice exams too. Official guide or the glossary section should clarify which term is standard. Agree?
Be respectful. No spam.
Q: 20
A global technology company stores sensitive intellectual property (IP) and customer data in the cloud.
They need to ensure that sensitive data is not accidentally or maliciously shared outside the
organization, whether through email, cloud storage services, or web uploads. Which DLP strategy would
be most effective in this scenario?
Options
Discussion
I think C
Question's clear and the scenario makes sense, pretty similar to what I've seen in some practice sets.
Question's clear and the scenario makes sense, pretty similar to what I've seen in some practice sets.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2