Search Header Logo

Chapter 9 casp

Authored by Timothy Courson

Professional Development

Professional Development

Used 3+ times

Chapter 9 casp
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are setting up a new viral machine. What type of virtualization should you use to coordinate instructions directly to the CPU?

Type B

Type 1

Type 2

No VM directly sends instructions to the CPU

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your dev OPS team decided to use containers because they allow running applications on any hardware. What is the first thing your team should do to have a secure container environment?

Install IPS

Lock down Kubernetes and monitor registries

Configure antimalware and traffic filtering

Disable services that are not required and install monitoring tools

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're exploring the best option for your team to read data that was written onto storage material by device you do not have access to, and the backup device has been broken. Which of the following is the best option for this?

Type 1 hypervisor

Type 2 hypervisor

Emulation

PaaS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your security architect building out a new hardware based VM. Which of the following would least likely threaten your new virtualized environment?

Patching and Maintenance

VM sprawl

Oversight and responsibility

Faster provisioning and disaster recovery

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You work in an information security for stock trading organization. You've been tasked with reducing cost and managing employee workstations. One of the biggest concerns is how to prevent employees from copying data to any external storage . Which of the following best manages the situation?

Move all operations to the cloud and disable VPN

Implement server virtualization and move critical applications to the server

Use VDI and disable hardware and storage mapping from a thin client

Encrypt all sensitive data at rest and in transit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Management of your host application environment requires end to end visibility and a high end performance connection while monitoring for security issues. What should you consider for most control and visibility?

You should consider a provider with connections from your location directly into the applications cloud resources

You should have a private T1 line installed for this access

You should secure a VPN concentrator for this task

You should use HTTPS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As the IT director of a nonprofit agency, you have been challenged at a local conference to provide technical cloud infrastructure that will be shared between several organizations like yours. What is the best cloud partnership to form?

Private cloud

Public cloud

Hybrid cloud

Community cloud

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?