
Security+ Phase 6
Authored by Vicky Widjaya
Computers, Professional Development, Specialty
Professional Development
Used 13+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
62 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
You are a server virtualization consultant. During a planning meeting with a client, the issue of virtual machine point-in-time snapshots comes up. You recommend careful use of snapshots because of the security ramifications. Which security problem is the most likely to occur when using snapshots?
Snapshots can consume a large amount of disk space.
Snapshots could expose sensitive data.
Invoked snapshots will mean that the virtual machine is temporarily unavailable.
Invoked snapshots will have fewer patch updates than the currently running virtual machine.
2.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
A private medical practice hires you to determine the feasibility of cloud computing, whereby storage of e-mail and medical applications, as well as patient information, would be hosted by a public cloud provider. You are asked to identify potential problems related to sensitive data regulatory compliance. (Choose two.)
Data is stored on the cloud provider’s infrastructure, which is shared by other cloud tenants.
HTTPS will be used to access remote services.
Should the provider be served a subpoena, the possibility of full data disclosure exists.
Data will be encrypted in transit as well as when stored.
3.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Which of the following are true regarding virtualization? (Choose two.)
Each virtual machine has one or more unique MAC addresses.
Virtual machine operating systems do not need to be patched.
Virtual machines running on the same physical host can belong to different VLANs.
A security compromise of one virtual machine means all virtual machines on the physical host are compromised.
4.
MULTIPLE SELECT QUESTION
2 mins • 1 pt
Cloud computing offers which benefits? (Choose two.)
Scalability
Fewer hardware purchases
Better encryption
Local data storage
No requirement for on-premises antivirus software
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
You are responsible for three IaaS payroll servers that store data in the cloud. The chief financial officer (CFO) requests observation of access to a group of budget files by a particular user. What should you do?
Create file hashes for each budget file.
Encrypt the budget files.
Configure a HIDS to monitor the budget files.
Configure file system auditing for cloud storage.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
As the database administrator for your company, you are evaluating various public cloud offerings to test customer database app code changes. Which category of cloud service should you research?
Software as a Service
Platform as a Service
Infrastructure as a Service
Anything as a Service
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Your company hosts an on-premises Microsoft Active Directory server to authenticate network users. Mailboxes and productivity applications for users are hosted in a public cloud. You have configured identity federation to enable locally authenticated users to connect to their mailboxes and productivity applications seamlessly. What type of cloud deployment model is in use?
Public
Private
Hybrid
Community
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?