لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
CCM: The Cloud Service Delivery Model Applicability column in the CCM indicates the applicability of the cloud security control to which of the following elements?
A. Mappings to well-known standards and frameworks
B. Service Provider or Tenant/Consumer
C. Physical, Network, Compute, Storage, Application or Data
D. SaaS, PaaS or IaaS
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A defining set of rules composed of claims and attributes of the entities in a transaction, which is used to determine their level of access to cloud-based resources is called what?
A. An entitlement matrix
B. A support table
C. An entry log
D. A validation process
E. An access log
عرض الإجابة
اجابة صحيحة: D
السؤال #3
How does virtualized storage help avoid data loss if a drive fails?
A. Multiple copies in different locations
B. Drives are backed up, swapped, and archived constantly
C. Full back ups weekly
D. Data loss is unavoidable with drive failures
E. Incremental backups daily
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which cloud-based service model enables companies to provide client-based access for partners to databases or applications?
A. Platform-as-a-service (PaaS)
B. Desktop-as-a-service (DaaS)
C. Infrastructure-as-a-service (IaaS)
D. Identity-as-a-service (IDaaS)
E. Software-as-a-service (SaaS)
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which concept provides the abstraction needed for resource pools?
A. Virtualization
B. Applistructure
C. Hypervisor
D. Metastructure
E. Orchestration
عرض الإجابة
اجابة صحيحة: B
السؤال #6
When designing an encryption system, you should start with a threat model.
A. False
B. True
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Select the statement below which best describes the relationship between identities and attributes
A. Attributes belong to entities and identities belong to attribute
B. Each attribute can have multiple identities but only one entity
C. An attribute is a unique object within a databas
D. Each attribute it has a number of identities which help define its parameters
E. An identity is a distinct and unique object within a particular namespac
F. Attributes are properties which belong to an identit G
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Network logs from cloud providers are typically flow records, not full packet captures.
A. False
B. True
عرض الإجابة
اجابة صحيحة: D
السؤال #9
CCM: A company wants to use the IaaS offering of some CSP. Which of the following options for using CCM is NOT suitable for the company as a cloud customer?
A. Submit the CCM on behalf of the CSP to CSA Security, Trust & Assurance Registry (STAR), a free, publicly accessible registry that documents the security controls provided by CSPs
B. Use CCM to build a detailed list of requirements and controls that they want their CSP to implement
C. Use CCM to help assess the risk associated with the CSP
D. None of the above
عرض الإجابة
اجابة صحيحة: A
السؤال #10
ENISA: Which is not one of the five key legal issues common across all scenarios:
A. Data protection
B. Professional negligence
C. Globalization
D. Intellectual property
E. Outsourcing services and changes in control
عرض الإجابة
اجابة صحيحة: A
السؤال #11
What is resource pooling?
A. The provider’s computing resources are pooled to serve multiple consumers
B. Internet-based CPUs are pooled to enable multi-threading
C. The dedicated computing resources of each client are pooled together in a colocation facility
D. Placing Internet (“cloud”) data centers near multiple sources of energy, such as hydroelectric dams
E. None of the above
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: