Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

Managing-Cloud-Security Questions and Answers

Question # 6

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Full Access
Question # 7

Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?

A.

Regulator

B.

Cloud service partner

C.

Customer

D.

Cloud service developer

Full Access
Question # 8

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Full Access
Question # 9

Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?

A.

Cases

B.

Stories

C.

Cookies

D.

Notes

Full Access
Question # 10

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

A.

Data classification

B.

Hardware management

C.

Software procurement

D.

Acceptable use

Full Access
Question # 11

An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?

A.

They should create a checklist of the necessary tasks.

B.

They should determine the criteria of a disaster.

C.

They should identify the key roles in a disaster.

D.

They should perform an inventory of assets.

Full Access
Question # 12

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Full Access
Question # 13

An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?

A.

Continuous monitoring

B.

Confidential computing

C.

Regulatory oversight

D.

Incident management

Full Access
Question # 14

An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?

A.

Authorization

B.

Web application firewall (WAF)

C.

Access control list (ACL)

D.

Authentication

Full Access
Question # 15

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Full Access
Question # 16

An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?

A.

Connections to several electric providers that are not on the same grid

B.

Contracts with fuel providers

C.

Contracts with heating, ventilation, and air conditioning (HVAC) providers

D.

Connections to several internet service providers

Full Access
Question # 17

Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?

A.

Use additional encryption for sensitive files and folders

B.

Use web application firewalls (WAFs)

C.

Use database activity monitoring (DAM)

D.

Use block storage instead of file storage

Full Access
Question # 18

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Full Access
Question # 19

Which activity is within the scope of the cloud provider’s role in the chain of custody?

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Full Access
Question # 20

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

A.

Firewall

B.

Virtual display

C.

Network

D.

Load balancer

Full Access
Question # 21

Which characteristic of cloud computing refers to sharing physical assets among multiple customers?

A.

Rapid scalability

B.

On-demand self-service

C.

Resource pooling

D.

Measured service

Full Access
Question # 22

Which concept focuses on operating highly available workloads in the cloud?

A.

Resource hierarchy

B.

Security

C.

Operational excellence

D.

Reliability

Full Access
Question # 23

Which security concept requires continuous identity and authorization checks to allow access to data?

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Full Access
Question # 24

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Full Access