لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
In the Software-as-a-service relationship, who is responsible for the majority of the security?
A. Application Consumer
B. Database Manager
C. Application Developer
D. Cloud Provider
E. Web Application CISO
عرض الإجابة
اجابة صحيحة: D
السؤال #2
What are the primary security responsibilities of the cloud provider in the management infrastructure?
A. Building and properly configuring a secure network infrastructure
B. Configuring second factor authentication across the network
C. Properly configuring the deployment of the virtual network, especially the firewalls
D. Properly configuring the deployment of the virtual network, except the firewalls
E. Providing as many API endpoints as possible for custom access and configurations
عرض الإجابة
اجابة صحيحة: D
السؤال #3
What are the primary security responsibilities of the cloud provider in compute virtualizations?
A. Enforce isolation and maintain a secure virtualization infrastructure
B. Monitor and log workloads and configure the security settings
C. Enforce isolation and configure the security settings
D. Maintain a secure virtualization infrastructure and configure the security settings
E. Enforce isolation and monitor and log workloads
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which type of application security testing tests running applications and includes tests such as web vulnerability testing and fuzzing?
A. Code Review
B. Static Application Security Testing (SAST)
C. Unit Testing
D. Functional Testing
E. Dynamic Application Security Testing (DAST)
عرض الإجابة
اجابة صحيحة: D
السؤال #5
ENISA: Which is a potential security benefit of cloud computing?
A. More efficient and timely system updates
B. ISO 27001 certification
C. Provider can obfuscate system O/S and versions
D. Greater compatibility with customer IT infrastructure
E. Lock-In
عرض الإجابة
اجابة صحيحة: B
السؤال #6
What item below allows disparate directory services and independent security domains to be interconnected?
A. Coalition
B. Cloud
C. Intersection
D. Union
E. Federation
عرض الإجابة
اجابة صحيحة: E
السؤال #7
CCM: In the CCM tool, ais a measure that modifies risk and includes any process, policy, device, practice or any other actions which modify risk.
A. Risk Impact
B. Domain
C. Control Specification
عرض الإجابة
اجابة صحيحة: D
السؤال #8
What can be implemented to help with account granularity and limit blast radius with laaS an PaaS?
A. Configuring secondary authentication
B. Establishing multiple accounts
C. Maintaining tight control of the primary account holder credentials
D. Implementing least privilege accounts
E. Configuring role-based authentication
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Select the best definition of “compliance” from the options below.
A. The development of a routine that covers all necessary security measures
B. The diligent habits of good security practices and recording of the same
C. The timely and efficient filing of security reports
D. The awareness and adherence to obligations, including the assessment and prioritization of corrective actions deemed necessary and appropriate
E. The process of completing all forms and paperwork necessary to develop a defensible paper trail
عرض الإجابة
اجابة صحيحة: A
السؤال #10
How should an SDLC be modified to address application security in a Cloud Computing environment?
A. Integrated development environments
B. Updated threat and trust models
C. No modification is needed
D. Just-in-time compilers
E. Both B and C
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: