لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which statement best describes the Data Security Lifecycle?
A. The Data Security Lifecycle has six stages, is strictly linear, and never varies
B. The Data Security Lifecycle has six stages, can be non-linear, and varies in that some data may never pass through all stages
C. The Data Security Lifecycle has five stages, is circular, and varies in that some data may never pass through all stages
D. The Data Security Lifecycle has six stages, can be non-linear, and is distinct in that data must always pass through all phases
E. The Data Security Lifecycle has five stages, can be non-linear, and is distinct in that data must always pass through all phases
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which term is used to describe the use of tools to selectively degrade portions of the cloud to continuously test business continuity?
A. Planned Outages
B. Resiliency Planning
C. Expected Engineering
D. Chaos Engineering
E. Organized Downtime
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Cloud services exhibit five essential characteristics that demonstrate their relation to, and differences from, traditional computing approaches. Which one of the five characteristics is described as: a consumer can unilaterally provision computing capabilities such as server time and network storage as needed.
A. Rapid elasticity
B. Resource pooling
C. Broad network access
D. Measured service
E. On-demand self-service
عرض الإجابة
اجابة صحيحة: C
السؤال #4
What method can be utilized along with data fragmentation to enhance security?
A. Encryption
B. Organization
C. Knowledge management
D. IDS
E. Insulation
عرض الإجابة
اجابة صحيحة: B
السؤال #5
CCM: A hypothetical start-up company called "ABC" provides a cloud based IT management solution. They are growing rapidly and therefore need to put controls in place in order to manage any changes in their production environment. Which of the following Change Control & Configuration Management production environment specific control should they implement in this scenario?
A. Policies and procedures shall be established for managing the risks associated with applying changes to business-critical or customer (tenant)-impacting (physical and virtual) applications and systemsystem interface (API) designs and configurations, infrastructure network and systems components
B. Policies and procedures shall be established, and supporting business processes and technical measures implemented, to restrict the installation of unauthorized software on organizationally-owned ormanaged user end-point devices (e
C. issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components
D. All cloud-based services used by the company's mobile devices or BYOD shall be pre-approved for usage and the storage of company business data
E. None of the above
عرض الإجابة
اجابة صحيحة: A
السؤال #6
All cloud services utilize virtualization technologies.
A. False
B. True
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Which governance domain focuses on proper and adequate incident detection, response, notification, and remediation?
A. Data Security and Encryption
B. Information Governance
C. Incident Response, Notification and Remediation
D. Compliance and Audit Management
E. Infrastructure Security
عرض الإجابة
اجابة صحيحة: A
السؤال #8
What of the following is NOT an essential characteristic of cloud computing?
A. Broad Network Access
B. Measured Service
C. Third Party Service
D. Rapid Elasticity
E. Resource Pooling
عرض الإجابة
اجابة صحيحة: A
السؤال #9
In the cloud provider and consumer relationship, which entity manages the virtual or abstracted infrastructure?
A. Only the cloud consumer
B. Only the cloud provider
C. Both the cloud provider and consumer
D. It is determined in the agreement between the entities
E. It is outsourced as per the entity agreement
عرض الإجابة
اجابة صحيحة: E
السؤال #10
Which of the following encryption methods would be utilized when object storage is used as the back-end for an application?
A. Database encryption
B. Media encryption
C. Asymmetric encryption
D. Object encryption
E. Client/application encryption
عرض الإجابة
اجابة صحيحة: E
السؤال #11
Which cloud storage technology is basically a virtual hard drive for instanced or VMs?
A. Volume storage
B. Platform
C. Database
D. Application
E. Object storage
عرض الإجابة
اجابة صحيحة: A
السؤال #12
When deploying Security as a Service in a highly regulated industry or environment, what should both parties agree on in advance and include in the SLA?
A. The metrics defining the service level required to achieve regulatory objectives
B. The duration of time that a security violation can occur before the client begins assessing regulatory fines
C. The cost per incident for security breaches of regulated information
D. The regulations that are pertinent to the contract and how to circumvent them
E. The type of security software which meets regulations and the number of licenses that will be needed
عرض الإجابة
اجابة صحيحة: D
السؤال #13
For third-party audits or attestations, what is critical for providers to publish and customers to evaluate?
A. Scope of the assessment and the exact included features and services for the assessment
B. Provider infrastructure information including maintenance windows and contracts
C. Network or architecture diagrams including all end point security devices in use
D. Service-level agreements between all parties
E. Full API access to all required services
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: