- (Exam Topic 1)
Which of the following may unilaterally deem a cloud hosting model inappropriate for a system or application?
Correct Answer:
C
Some regulations may require specific security controls or certifications be used for hosting certain types of data or functions, and in some circumstances they may be requirements that are unable to be met by any cloud provider.
- (Exam Topic 1)
Which technology can be useful during the "share" phase of the cloud data lifecycle to continue to protect data as it leaves the original system and security controls?
Correct Answer:
C
Data loss prevention (DLP) can be applied to data that is leaving the security enclave to continue to enforce access restrictions and policies on other clients and systems.
- (Exam Topic 4)
Database activity monitoring (DAM) can be:
Correct Answer:
A
We don’t use DAM in place of encryption or masking; DAM augments these options without replacing them. We don’t usually think of the database interaction as client-server, so A is the best answer.
- (Exam Topic 3)
Clustered systems can be used to ensure high availability and load balancing across individual systems through a variety of methodologies.
What process is used within a clustered system to ensure proper load balancing and to maintain the health of the overall system to provide high availability?
Correct Answer:
D
Distributed resource scheduling (DRS) is used within all clustered systems as the method for providing high availability, scaling, management, workload distribution, and the balancing of jobs and processes. None of the other choices is the correct term in this case.
- (Exam Topic 1)
How is an object stored within an object storage system?
Correct Answer:
A
Object storage uses a flat structure with key values to store and access objects.