Q: 1
Which device is used to create and manage encryption keys used for data transmission in a cloud-
based environment?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
An organization needs to provide space where security administrators can centrally monitor network
traffic and events and respond to threats or outages. What should the organization create?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
An organization negotiates a new contract with a cloud provider and wants to ensure that its critical
business data is protected if the cloud provider goes out of business. For this reason, the organization
wants the cloud provider to store a copy of the organization's data with a neutral third party, which
would release the data in case the provider is unable to meet its obligations. Which type of provision
should be included in the contract to ensure this?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which phase of the cloud data life cycle involves the process of crypto-shredding?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which data destruction technique involves encrypting the data, followed by encrypting the resulting
keys with a different engine, and then destroying the keys resulting from the second encryption
round?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Which release management term describes the process from code implementation to code review
and approval to automated testing and then to production deployment?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
Which category of cloud service provides on-demand, self-service access to basic building blocks,
such as virtualized servers, block storage, and networking capacity, that can be used to create custom
IT solutions?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
A group of DevOps engineers adopted the network-as-code methodology to manage network
infrastructure. During a code release, the engineers find a bug that is causing issues on a production
site. Which safeguard will allow the engineers to restore functionality to the production site?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
An organization experienced an unplanned event. As a result, the customers using the web
application face a loss of service. What does the incident generated in this situation seek to resolve?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2