Quiz Summary
0 of 25 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 25 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- Current
- Review / Skip
- Answered
- Correct
- Incorrect
-
Question 1 of 25
1. Question
Matthew is reviewing a new cloud service offering that his organization plans to adopt. In this offering, a cloud provider will create virtual server instances under the multitenancy model. Each server instance will be accessible only to Matthew’s company. What cloud deployment model is being used?
CorrectIncorrect -
Question 2 of 25
2. Question
Which type of business impact assessment tool is most appropriate when attempting to evaluate the impact of a failure on customer confidence?
CorrectIncorrect -
Question 3 of 25
3. Question
Zeke is responsible for sanitizing a set of solid-state drives (SSDs) removed from servers in his organization’s datacenter. The drives will be reused on a different project. Which one of the following sanitization techniques would be most effective?
CorrectIncorrect -
Question 4 of 25
4. Question
Robert is reviewing a system that has been assigned the EAL2 evaluation assurance level under the Common Criteria. What is the highest level of assurance that he may have about the system?
CorrectIncorrect -
Question 5 of 25
5. Question
Tina would like to use a technology that will allow her to bundle up workloads and easily move them between different operating systems. What technology would best meet this need?
CorrectIncorrect -
Question 6 of 25
6. Question
Jake would like to use a third-party platform to automatically move workloads between cloud service providers. What type of tool would best meet this need?
CorrectIncorrect -
Question 7 of 25
7. Question
Under the cloud reference architecture, which one of the following activities is not generally part of the responsibilities of a customer?
CorrectIncorrect -
Question 8 of 25
8. Question
Robert is responsible for securing systems used to process credit card information. What security control framework should guide his actions?
CorrectIncorrect -
Question 9 of 25
9. Question
Seth is helping his organization move their web server cluster to a cloud provider. The goal of this move is to provide the cluster with the ability to grow and shrink based on changing demand. What characteristic of cloud computing is Seth hoping to achieve?
CorrectIncorrect -
Question 10 of 25
10. Question
What type of effort attempts to bring all of an organization’s cloud activities under more centralized control?
CorrectIncorrect -
Question 11 of 25
11. Question
Sherry is deploying a zero-trust network architecture for her organization. In this approach, which one of the following characteristics would be least important in validating a login attempt?
CorrectIncorrect -
Question 12 of 25
12. Question
Chris is designing a cryptographic system for use within his company. The company has 1,000 employees, and they plan to use an asymmetric encryption system. They would like the system to be set up so that any pair of arbitrary users may communicate privately. How many total keys will they need?
CorrectIncorrect -
Question 13 of 25
13. Question
Which one of the following hypervisor models is the most resistant to attack?
CorrectIncorrect -
Question 14 of 25
14. Question
Erin is concerned about the risk that a cloud provider used by her organization will fail, so she is creating a strategy that will combine resources from multiple public cloud providers. What term best describes this strategy?
CorrectIncorrect -
Question 15 of 25
15. Question
Joe is using a virtual server instance running on a public cloud provider and would like to restrict the ports on that server accessible from the internet. What security control would best allow him to meet this need?
CorrectIncorrect -
Question 16 of 25
16. Question
Which one of the following would normally be considered an application capability of a cloud service provider?
CorrectIncorrect -
Question 17 of 25
17. Question
Which one of the following cybersecurity threats is least likely to directly affect an object storage service?
CorrectIncorrect -
Question 18 of 25
18. Question
What activity are cloud providers able to engage in because not all users will access the full capacity of their service offering simultaneously?
CorrectIncorrect -
Question 19 of 25
19. Question
Vince would like to be immediately alerted whenever a user with access to a sensitive cloud service leaves a defined physical area. What type of security control should he implement?
CorrectIncorrect -
Question 20 of 25
20. Question
Which one of the following characteristics is not a component of the standard definition of cloud computing?
CorrectIncorrect -
Question 21 of 25
21. Question
Which one of the following sources provides a set of vendor-neutral design patterns for cloud security?
CorrectIncorrect -
Question 22 of 25
22. Question
Lori is using an API to access sensitive information stored in a cloud service. What cloud secure data lifecycle activity is Lori engaged in?
CorrectIncorrect -
Question 23 of 25
23. Question
Helen would like to provision a disk volume in the cloud that is mountable from a server. What cloud capability does she want?
CorrectIncorrect -
Question 24 of 25
24. Question
Ben is using the
sudo
command to carry out operations on a Linux server. What type of access is he using?CorrectIncorrect -
Question 25 of 25
25. Question
Which one of the following cryptographic goals protects against the risks posed when a device is lost or stolen?
CorrectIncorrect