View Mode
Q: 11
Which of the following actions will NOT make data part of the "create" phase of the cloud data lifecycle?
Options
Q: 12
What is the minimum regularity for testing a BCDR plan to meet best practices? 67/315
Options
Q: 13
You are designing the logical layout of a secure data center for a large enterprise that uses a multi- tenant architecture. Your objective is to ensure strict tenant partitioning and robust access control to prevent unauthorized access and data leakage between tenants. Which of the following measures would be most effective in ensuring tenant partitioning and access control in a multi-tenant environment?
Options
Q: 14
Your organization is planning to outsource its data processing functions to a cloud service provider. The organization requires guarantees for data availability and performance. You are responsible for ensuring that these guarantees are legally binding and enforceable. Which document should you focus on to ensure that data availability and performance requirements are legally binding and enforceable?
Options
Q: 15
Why does a Type 1 hypervisor typically offer tighter security controls than a Type 2 hypervisor?
Options
Q: 16

What is a key capability or characteristic of PaaS?

Options
Q: 17
Which phase of the cloud data lifecycle represents the first instance where security controls can be implemented?
Options
Q: 18
A multinational corporation's cloud infrastructure is vulnerable to newly discovered threats. The company needs to ensure that all its systems, including virtual machines and applications, are up-to-date with the latest security patches. What is the most effective patch management strategy?
Options
Q: 19
Which of the following concepts refers to a cloud customer paying only for the resources and offerings they use within a cloud environment, and only for the duration that they are consuming them?
Options
Q: 20
A global technology company stores sensitive intellectual property (IP) and customer data in the cloud. They need to ensure that sensitive data is not accidentally or maliciously shared outside the organization, whether through email, cloud storage services, or web uploads. Which DLP strategy would be most effective in this scenario?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE