لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What are the encryption options available for SaaS consumers?
A. Any encryption option that is available for volume storage, object storage, or PaaS
B. Provider-managed and (sometimes) proxy encryption
C. Client/application and file/folder encryption
D. Object encryption Volume storage encryption
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Vulnerability assessments cannot be easily integrated into CI/CD pipelines because of provider restrictions.
A. False
B. True
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Audits should be robustly designed to reflect best practice, appropriate resources, and tested protocols and standards. They should also use what type of auditors?
A. Auditors working in the interest of the cloud customer
B. Independent auditors
C. Certified by CSA
D. Auditors working in the interest of the cloud provider
E. None of the above
عرض الإجابة
اجابة صحيحة: D
السؤال #4
What is known as the interface used to connect with the metastructure and configure the cloud environment?
A. Administrative access
B. Management plane
C. Identity and Access Management
D. Single sign-on
E. Cloud dashboard
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which statement best describes why it is important to know how data is being accessed?
A. The devices used to access data have different storage formats
B. The devices used to access data use a variety of operating systems and may have different programs installed on them
C. The device may affect data dispersion
D. The devices used to access data use a variety of applications or clients and may have different security characteristics
E. The devices used to access data may have different ownership characteristics
عرض الإجابة
اجابة صحيحة: D
السؤال #6
CCM: Cloud Controls Matrix (CCM) is a completely independent cloud assessment toolkit that does not map any existing standards.
A. True
B. False
عرض الإجابة
اجابة صحيحة: B
السؤال #7
ENISA: A reason for risk concerns of a cloud provider being acquired is:
A. Arbitrary contract termination by acquiring company
B. Resource isolation may fail
C. Provider may change physical location
D. Mass layoffs may occur
E. Non-binding agreements put at risk
عرض الإجابة
اجابة صحيحة: C
السؤال #8
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
A. False
B. True
عرض الإجابة
اجابة صحيحة: E
السؤال #9
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
A. Sales
B. Marketing
C. Legal counsel
D. Auditors
E. Accounting
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which of the following statements best describes an identity federation?
A. A library of data definitions
B. A group of entities which have decided to exist together in a single cloud
C. Identities which share similar attributes
D. Several countries which have agreed to define their identities with similar attributes
E. The connection of one identity repository to another
عرض الإجابة
اجابة صحيحة: C
السؤال #11
ENISA: Lock-in is ranked as a high risk in ENISA research, a key underlying vulnerability causing lock in is:
A. Lack of completeness and transparency in terms of use
B. Lack of information on jurisdictions
C. No source escrow agreement
D. Unclear asset ownership
E. Audit or certification not available to customers
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: