لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which statement best describes the impact of Cloud Computing on business continuity management?
A. A general lack of interoperability standards means that extra focus must be placed on the security aspects of migration between Cloud providers
B. The size of data sets hosted at a Cloud provider can present challenges if migration to another provider becomes necessary
C. Customers of SaaS providers in particular need to mitigate the risks of application lock-in
D. Clients need to do business continuity planning due diligence in case they suddenly need to switch providers
E. Geographic redundancy ensures that Cloud Providers provide highly available services
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which of the following is NOT a cloud computing characteristic that impacts incidence response?
A. The on demand self-service nature of cloud computing environments
B. Privacy concerns for co-tenants regarding the collection and analysis of telemetry and artifacts associated with an incident
C. The possibility of data crossing geographic or jurisdictional boundaries
D. Object-based storage in a private cloud
E. The resource pooling practiced by cloud services, in addition to the rapid elasticity offered by cloud infrastructures
عرض الإجابة
اجابة صحيحة: B
السؤال #3
How can key management be leveraged to prevent cloud providers from inappropriately accessing customer data?
A. Use strong multi-factor authentication
B. Secure backup processes for key management systems
C. Segregate keys from the provider hosting data
D. Stipulate encryption in contract language
E. Select cloud providers within the same country as customer
عرض الإجابة
اجابة صحيحة: C
السؤال #4
ENISA: “VM hopping” is:
A. Improper management of VM instances, causing customer VMs to be commingled with other customer systems
B. Looping within virtualized routing systems
C. Lack of vulnerability management standards
D. Using a compromised VM to exploit a hypervisor, used to take control of other VMs
E. Instability in VM patch management causing VM routing errors
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which of the following is one of the five essential characteristics of cloud computing as defined by NIST?
A. Multi-tenancy
B. Nation-state boundaries
C. Measured service
D. Unlimited bandwidth
E. Hybrid clouds
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which of the following statements best defines the "authorization" as a component of identity, entitlement, and access management?
A. The process of specifying and maintaining access policies
B. Checking data storage to make sure it meets compliance requirements
C. Giving a third party vendor permission to work on your cloud solution
D. Establishing/asserting the identity to the application
E. Enforcing the rules by which access is granted to the resources
عرض الإجابة
اجابة صحيحة: E
السؤال #7
An important consideration when performing a remote vulnerability test of a cloud-based application is to
A. Obtain provider permission for test
B. Use techniques to evade cloud provider’s detection systems
C. Use application layer testing tools exclusively
D. Use network layer testing tools exclusively
E. Schedule vulnerability test at night
عرض الإجابة
اجابة صحيحة: D
السؤال #8
What does it mean if the system or environment is built automatically from a template?
A. Nothing
B. It depends on how the automation is configured
C. Changes made in production are overwritten by the next code or template change
D. Changes made in test are overwritten by the next code or template change
E. Changes made in production are untouched by the next code or template change
عرض الإجابة
اجابة صحيحة: B
السؤال #9
If in certain litigations and investigations, the actual cloud application or environment itself is relevant to resolving the dispute in the litigation or investigation, how is the information likely to be obtained?
A. It may require a subpoena of the provider directly
B. It would require a previous access agreement
C. It would require an act of war
D. It would require a previous contractual agreement to obtain the application or access to the environment
E. It would never be obtained in this situation
عرض الإجابة
اجابة صحيحة: C
السؤال #10
What is defined as the process by which an opposing party may obtain private documents for use in litigation?
A. Discovery
B. Custody
C. Subpoena
D. Risk Assessment
E. Scope
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A cloud deployment of two or more unique clouds is known as:
A. Infrastructures as a Service
B. A Private Cloud
C. A Community Cloud
D. A Hybrid Cloud
E. Jericho Cloud Cube Model
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which attack surfaces, if any, does virtualization technology introduce?
A. The hypervisor
B. Virtualization management components apart from the hypervisor
C. Configuration and VM sprawl issues
D. All of the above
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following items is NOT an example of Security as a Service (SecaaS)?
A. Spam filtering
B. Authentication
C. Provisioning
D. Web filtering
E. Intrusion detection
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: