لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which layer is the most important for securing because it is considered to be the foundation for secure cloud operations?
A. Infrastructure
B. Datastructure
C. Infostructure
D. Applistructure
E. Metastructure
عرض الإجابة
اجابة صحيحة: D
السؤال #2
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
A. The metrics defining the service level required to achieve regulatory objectives
B. The duration of time that a security violation can occur before the client begins assessing regulatory fines
C. The cost per incident for security breaches of regulated information
D. The regulations that are pertinent to the contract and how to circumvent them
E. The type of security software which meets regulations and the number of licenses that will be needed
عرض الإجابة
اجابة صحيحة: A
السؤال #3
CCM: A hypothetical company called: “Health4Sure” is located in the United States and provides cloud based services for tracking patient health. The company is compliant with HIPAA/HITECH Act among other industry standards. Health4Sure decides to assess the overall security of their cloud service against the CCM toolkit so that they will be able to present this document to potential clients. Which of the following approach would be most suitable to assess the overall security posture of Health4Sure’s cloud
A. The CCM columns are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered ad a result of their compliance with HIPPA/HITECH Act
B. The CCM domain controls are mapped to HIPAA/HITECH Act and therefore Health4Sure could verify the CCM controls already covered as a result of their compliance with HIPPA/HITECH Act
C. The CCM domains are not mapped to HIPAA/HITECH Act
عرض الإجابة
اجابة صحيحة: A
السؤال #4
In which type of environment is it impractical to allow the customer to conduct their own audit, making it important that the data center operators are required to provide auditing for the customers?
A. Multi-application, single tenant environments
B. Long distance relationships
C. Multi-tenant environments
D. Distributed computing arrangements
E. Single tenant environments
عرض الإجابة
اجابة صحيحة: D
السؤال #5
CCM: The following list of controls belong to which domain of the CCM? GRM 06 – Policy GRM 07 – Policy Enforcement GRM 08 – Policy Impact on Risk Assessments GRM 09 – Policy Reviews GRM 10 – Risk Assessments GRM 11 – Risk Management Framework
A. Governance and Retention Management
B. Governance and Risk Management
C. Governing and Risk Metrics
عرض الإجابة
اجابة صحيحة: E
السؤال #6
What is the best way to ensure that all data has been removed from a public cloud environment including all media such as back-up tapes?
A. Allowing the cloud provider to manage your keys so that they have the ability to access and delete the data from the main and back-up storage
B. Maintaining customer managed key management and revoking or deleting keys from the key management system to prevent the data from being accessed again
C. Practice Integration of Duties (IOD) so that everyone is able to delete the encrypted data
D. Keep the keys stored on the client side so that they are secure and so that the users have the ability to delete their own data
E. Both B and
D.
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which of the following statements are NOT requirements of governance and enterprise risk management in a cloud environment?
A. Inspect and account for risks inherited from other members of the cloud supply chain and take active measures to mitigate and contain risks through operational resiliency
B. Respect the interdependency of the risks inherent in the cloud supply chain and communicate the corporate risk posture and readiness to consumers and dependent parties
C. Negotiate long-term contracts with companies who use well-vetted software application to avoid the transient nature of the cloud environment
D. Provide transparency to stakeholders and shareholders demonstrating fiscal solvency and organizational transparency
E. Both B and
C.
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Sending data to a provider’s storage over an API is likely as much more reliable and secure than setting up your own SFTP server on a VM in the same provider
A. False
B. True
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
A. Platform-as-a-service (PaaS)
B. Desktop-as-a-service (DaaS)
C. Infrastructure-as-a-service (IaaS)
D. Identity-as-a-service (IDaaS)
E. Software-as-a-service (SaaS)
عرض الإجابة
اجابة صحيحة: C
السؤال #10
CCM: In the CCM tool, a _____________________ is a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
A. Risk Impact
B. Domain
C. Control Specification
عرض الإجابة
اجابة صحيحة: C
السؤال #11
APIs and web services require extensive hardening and must assume attacks from authenticated and unauthenticated adversaries.
A. False
B. True
عرض الإجابة
اجابة صحيحة: D
السؤال #12
What is true of companies considering a cloud computing business relationship?
A. The laws protecting customer data are based on the cloud provider and customer location only
B. The confidentiality agreements between companies using cloud computing services is limited legally to the company, not the provider
C. The companies using the cloud providers are the custodians of the data entrusted to them
D. The cloud computing companies are absolved of all data security and associated risks through contracts and data laws
E. The cloud computing companies own all customer data
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which communication methods within a cloud environment must be exposed for partners or consumers to access database information using a web application?
A. Software Development Kits (SDKs)
B. Resource Description Framework (RDF)
C. Extensible Markup Language (XML)
D. Application Binary Interface (ABI)
E. Application Programming Interface (API)
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: