لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A cloud deployment of two or more unique clouds is known as:
A. Infrastructures as a Service
B. A Private Cloud
C. A Community Cloud
D. A Hybrid Cloud
E. Jericho Cloud Cube Model
عرض الإجابة
اجابة صحيحة: C
السؤال #2
ENISA: Which is not one of the five key legal issues common across all scenarios:
A. Data protection
B. Professional negligence
C. Globalization
D. Intellectual property
E. Outsourcing services and changes in control
عرض الإجابة
اجابة صحيحة: C
السؤال #3
ENISA: An example high risk role for malicious insiders within a Cloud Provider includes
A. Sales
B. Marketing
C. Legal counsel
D. Auditors
E. Accounting
عرض الإجابة
اجابة صحيحة: D
السؤال #4
What are the primary security responsibilities of the cloud provider in the management infrastructure?
A. Building and properly configuring a secure network infrastructure
B. Configuring second factor authentication across the network
C. Properly configuring the deployment of the virtual network, especially the firewalls
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
عرض الإجابة
اجابة صحيحة: D
السؤال #5
What is true of a workload?
A. It is a unit of processing that consumes memory
B. It does not require a hardware stack
C. It is always a virtual machine
D. It is configured for specific, established tasks
E. It must be containerized
عرض الإجابة
اجابة صحيحة: A
السؤال #6
ENISA: Which is a potential security benefit of cloud computing?
A. More efficient and timely system updates
B. ISO 27001 certification
C. Provider can obfuscate system O/S and versions
D. Greater compatibility with customer IT infrastructure
E. Lock-In
عرض الإجابة
اجابة صحيحة: A
السؤال #7
The Software Defined Perimeter (SDP) includes which components?
A. Client, Controller, and Gateway
B. Client, Controller, Firewall, and Gateway
C. Client, Firewall, and Gateway
D. Controller, Firewall, and Gateway
E. Client, Controller, and Firewall
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Which cloud security model type provides generalized templates for helping implement cloud security?
A. Conceptual models or frameworks
B. Design patterns
C. Controls models or frameworks
D. Reference architectures
E. Cloud Controls Matrix (CCM)
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Select the statement below which best describes the relationship between identities and attributes
A. Attributes belong to entities and identities belong to attributes
B. An attribute is a unique object within a database
C. An identity is a distinct and unique object within a particular namespace
D. Attributes are made unique by their identities
E. Identities are the network names given to servers
عرض الإجابة
اجابة صحيحة: D
السؤال #10
What is a potential concern of using Security-as-a-Service (SecaaS)?
A. Lack of visibility
B. Deployment flexibility
C. Scaling and costs
D. Intelligence sharing
E. Insulation of clients
عرض الإجابة
اجابة صحيحة: A
السؤال #11
How should an SDLC be modified to address application security in a Cloud Computing environment?
A. Integrated development environments
B. Updated threat and trust models
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
A. Data Security and Encryption
B. Information Governance
C. Incident Response, Notification and Remediation
D. Compliance and Audit Management
E. Infrastructure Security
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which opportunity helps reduce common application security issues?
A. Elastic infrastructure
B. Default deny
C. Decreased use of micro-services
D. Segregation by default
E. Fewer serverless configurations
عرض الإجابة
اجابة صحيحة: A
السؤال #14
What is the most significant security difference between traditional infrastructure and cloud computing?
A. Management plane
B. Intrusion detection options
C. Secondary authentication factors
D. Network access points
E. Mobile security configuration options
عرض الإجابة
اجابة صحيحة: A
السؤال #15
A security failure at the root network of a cloud provider will not compromise the security of all customers because of multitenancy configuration.
A. False
B. True
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: