Security+ Phase 6

Security+ Phase 6

Professional Development

62 Qs

quiz-placeholder

Similar activities

Curriculum Development

Curriculum Development

University - Professional Development

66 Qs

AIPT FY1819 (1)

AIPT FY1819 (1)

9th Grade - Professional Development

60 Qs

Algorithm, Flowchart & Pseudocode

Algorithm, Flowchart & Pseudocode

University - Professional Development

66 Qs

SPL 04 pytania bez obliczeń

SPL 04 pytania bez obliczeń

Professional Development

65 Qs

Database management systems

Database management systems

Professional Development

58 Qs

Gmail

Gmail

Professional Development

65 Qs

PROGRAMIT I PЁBASHKЁT I PEDAGOGJISЁ, p.1 .60?

PROGRAMIT I PЁBASHKЁT I PEDAGOGJISЁ, p.1 .60?

University - Professional Development

60 Qs

IFCD40 P.O  2

IFCD40 P.O 2

Professional Development

60 Qs

Security+ Phase 6

Security+ Phase 6

Assessment

Quiz

Computers, Professional Development, Specialty

Professional Development

Hard

Created by

Vicky Widjaya

Used 13+ times

FREE Resource

62 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

You are a server virtualization consultant. During a planning meeting with a client, the issue of virtual machine point-in-time snapshots comes up. You recommend careful use of snapshots because of the security ramifications. Which security problem is the most likely to occur when using snapshots?

Snapshots can consume a large amount of disk space.

Snapshots could expose sensitive data.

Invoked snapshots will mean that the virtual machine is temporarily unavailable.

Invoked snapshots will have fewer patch updates than the currently running virtual machine.

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

A private medical practice hires you to determine the feasibility of cloud computing, whereby storage of e-mail and medical applications, as well as patient information, would be hosted by a public cloud provider. You are asked to identify potential problems related to sensitive data regulatory compliance. (Choose two.)

Data is stored on the cloud provider’s infrastructure, which is shared by other cloud tenants.

HTTPS will be used to access remote services.

Should the provider be served a subpoena, the possibility of full data disclosure exists.

Data will be encrypted in transit as well as when stored.

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Which of the following are true regarding virtualization? (Choose two.)

Each virtual machine has one or more unique MAC addresses.

Virtual machine operating systems do not need to be patched.

Virtual machines running on the same physical host can belong to different VLANs.

A security compromise of one virtual machine means all virtual machines on the physical host are compromised.

4.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Cloud computing offers which benefits? (Choose two.)

Scalability

Fewer hardware purchases

Better encryption

Local data storage

No requirement for on-premises antivirus software

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

You are responsible for three IaaS payroll servers that store data in the cloud. The chief financial officer (CFO) requests observation of access to a group of budget files by a particular user. What should you do?

Create file hashes for each budget file.

Encrypt the budget files.

Configure a HIDS to monitor the budget files.

Configure file system auditing for cloud storage.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

As the database administrator for your company, you are evaluating various public cloud offerings to test customer database app code changes. Which category of cloud service should you research?

Software as a Service

Platform as a Service

Infrastructure as a Service

Anything as a Service

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Your company hosts an on-premises Microsoft Active Directory server to authenticate network users. Mailboxes and productivity applications for users are hosted in a public cloud. You have configured identity federation to enable locally authenticated users to connect to their mailboxes and productivity applications seamlessly. What type of cloud deployment model is in use?

Public

Private

Hybrid

Community

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?