لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
How does running applications on distinct virtual networks and only connecting networks as needed help?
A. It reduces hardware costs
B. It provides dynamic and granular policies with less management overhead
C. It locks down access and provides stronger data security
D. It reduces the blast radius of a compromised system
E. It enables you to configure applications around business groups
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Without virtualization, there is no cloud.
A. False
B. True
عرض الإجابة
اجابة صحيحة: A
السؤال #3
How can virtual machine communications bypass network security controls?
A. VM communications may use a virtual network on the same hardware host
B. The guest OS can invoke stealth mode
C. Hypervisors depend upon multiple network interfaces
D. VM images can contain rootkits programmed to bypass firewalls
E. Most network security systems do not recognize encrypted VM traffic
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Which of the following is a perceived advantage or disadvantage of managing enterprise risk for cloud deployments?
A. More physical control over assets and processes
B. Greater reliance on contracts, audits, and assessments due to lack of visibility or management
C. Decreased requirement for proactive management of relationship and adherence to contracts
D. Increased need, but reduction in costs, for managing risks accepted by the cloud provider
E. None of the above
عرض الإجابة
اجابة صحيحة: A
السؤال #5
CCM: The Architectural Relevance column in the CCM indicates the applicability of the cloud security control to which of the following elements?
A. Service Provider or Tenant/Consumer
B. Physical, Network, Compute, Storage, Application or Data
C. SaaS, PaaS or IaaS
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Use elastic servers when possible and move workloads to new instances.
A. False
B. True
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What is a core tenant of risk management?
A. The provider is accountable for all risk management
B. You can manage, transfer, accept, or avoid risks
C. The consumers are completely responsible for all risk
D. If there is still residual risk after assessments and controls are inplace, you must accept the risk
E. Risk insurance covers all financial losses, including loss of customers
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What is true of security as it relates to cloud network infrastructure?
A. You should apply cloud firewalls on a per-network basis
B. You should deploy your cloud firewalls identical to the existing firewalls
C. You should always open traffic between workloads in the same virtual subnet for better visibility
D. You should implement a default allow with cloud firewalls and then restrict as necessary
E. You should implement a default deny with cloud firewalls
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: