1) You are working as a cloud architect at Congruence crop. Management
he asked you to implement an vitualized infrastructure to provide the
company’s employees with on-demand
storage which should be accessible through a web interface over the public
internet. Which of the following cloud deployment models will you use to
implement this ?
Private

2) Which of the following storage solutions saves space by eliminating
files or blocks that have redundant data?
Deduplication

3) You are as a cloud administrator at BigCo. Management he asked you to
move the company’s on-premises data to the cloud. You have received a request
from the network administration team while migrating. They want to manage both
the Linux- and Windows-based servers efficiently. What should you implement to
accomplish this task?
Secure Shell
Remote Desktop Protocol

4) Ron, a security analyst, found an unkwon design flaw in a product. He
notices that correcting the flaw would be cost-prohibitive and would only
affect a vey small number of customers. Rather than recalling the product, he
decides to simply the product as it is. This is best describe as what type of
risk response technique?
Acceptance

5) Which of the following risks should be considered during and after
the migration process while performing the right migration steps?
A)Security risks

6) Jack is Working as a network administration at NilCo. Management has
asked him to create a demilitarized zone (DMZ) in the cloud to enhance the
security of the company’s cloud network. What will he use to accomplish this
task?
Firewall

7) Which of the following cloud assessment techniques determine the
difference between where a company is now in business and technical readiness
versus where it needs to be?
Gap analysis

8) Joe is working as a product manager at NilCo. He is planning to make sure that an upcoming
company promotion suring a major sporting event does not overwhelm his
company’s cloud-based e-commerce site. For this, he need to add capacity to the
company’s web server so it can process the anticipated additional workload
dynamically. What should he use?
Horizontal scaling
Vertical scaling

9) What Is the first step of searching the right cloud vendor?
Request for information

10) What storage type is used for the OS boot partition of an instance
running in the cloud?
Block

11. A company has purchsed a new systm, but secrity
pesonnel is spending a lot of time on systm maintenancce . A new third pary
vendor has been selected for maintaning the company’s system. Which of the
following documents should be created before assigning the job to the vensor?
A).Service
level agreement

12. Which of the following is a final step that you
will perform in the cloud assessement process?
A). Create
documentation and diagrams.

13. what are the
four cloud deployment models?
A). public, private, hybrid, and
community

14. Will si testing his vackup disaster recovery site.
He wants to verfy that the database in the disaster recovery facility is
updated in real-time and ramains current with the production rerplica in the
primary data center, which of the following should he use in his primary data
denter servers?
A). Synchronous
replication

15. Stella, a cloud+ stident, is learning the process
of evaluating current sresources used in on-premeses data cetemine the
resources required in the cloud. What is she learning about?
A). Right-sizing

16. which of the follwing international Organization
for Standardization (ISO) standards is specific to CSPs and details information
security?
A) 27017

17. which of the following is the process of
obfuscatinf ddata such that only authrized individuals can read the data?
A).Encryption

18. which of the following porvides high-levvel
guidence dictated by business goals and objectives?
A). policy

19. which of the following are exmples of an operating
expenditure?
A).1. propertu taxes and insutance
2. Licences fees

20.which of the following makes networks more agile and
fiexible by separatring the fowarding of network packets (the infrastructure
layer) from the logical decision-making process (the control layer)?
A). Software-defined
networking

21) Which of the following is an
item or collection of items that has a qualitative value to a company?
A: Asset

22) which of the following
statements are correct regarding synchronous replication?
Each correct answer represents a complete solution. Choose all that
apply
A: It is limited the distance between the
locations
It writes data to multiple
locations in real-time

23) Tom is working as a cloud
administrator at BigCo. Management has asked him to increase the security of
the companys cloud resources so that no unauthorized can access the resources.
A: Multifactor authentication

24) Erika, a project manager, identifies a project risk that harm the team members. So she hires a professional
vendor to complete the critical part of the project. What type of risk response is she using for
handling the potential risk
A: Transference

25) Which of the following
allows clients to remotely connect to virtual Linux machine, securely, and act
as if the user were sitting at the virtual computer?
A: Secure shell

26) Who is responsible not only
for an organization’s asset but also for the risk response to any identified
threat to the said asset?
A: Risk owner
Asset owner

27) Bob is a cloud + architecture
for BigCo Inc. He is using a clous service that provides computing hardware,
but the operating system is not included . Which of the following cloud service
is he using?
A: Infrastructure as a service

28) Which of the following
documents includes the defined steps that an individual or an organization
takes once an event occurs?
A: Standard operating procedure

29) Roman is the network
administrator for a company. The company is currently managing an on-premises network using cloud serviceor
running some combination of two
A: Baseline

30) Which storage offerings will
have a cost associated with the amount of data stored even if resource using
the storage is powered off?
A: Block storage
File storage
Object storage

31. Which of the
following laws reforms the financial services industry and specifically
addressed concerns about protecting consumer privacy?
A) Gramm-Leach-Billey Act

32. David is
working as cloud administrator at NilCo. He is performing a cloud assessment
for the company’s new applications. Management has asked him to determine the
capabilities that can be offloaded to the cloud and the level of support
services needed. What will he use to accomplish this task?
A) Feasibility study

33. Which of the
following cloud characteristics explains that a cloud provides services to
serve multiple clients according to their priority?
A) Resource pooling

34. Which of the
following security policies defines behaviors and activities that are
acceptable in an organization?
A) Advisory

35. Jancie
manages the MySQL database thar runs on multi-CPU instance that has reached 100
percent utilization. The database can run on only a single server. What would
she used to support the requirements of this database?
A) Vertical scaling

36. Which cloud
computing model provides only low-level server resources to host applications
for organizations?
A) Infrastructure as a service

37. A company
hires contractors for six months to work on projects. After six months, a new
team of contractors will be brought in. Which type of software licensing allows
the license to be transferred from the first group to the second group?
A) Bring your own license

38. What refers
to the ability of a client to acquire additional cloud resources without
supplier intervention?
A) Self-service

39. Patrick is
working as a cloud administrator at
BigCo. He is looking at business requirements that specify the data available
at the disaster recovery site must not be more than 48 hours old. Which of the
following metrics relates to these requirements?
A) Recovery point objective

40. In dealing
with risks, which response is accomplished when an organization purchases
insurance to protect the income when a disaster or threat is realized?
A) Transference

41) Which of the following standard is concerned with
HIPAA, GLBA, PCi DSS, and FINRA ?
A)
Industry-based

42) You are negotiating cloud services with a CSP. You
need to ensure that your organization can get more storage space without CSP
intervention. Which service do you need?
A) Capacity on
demand

43) Frank, the CEO of an organization, has set up a
team to periodically evaluate regulatory compliance alone with associated
documentation. His team implmented a policy that focuses on protecting the
information that uniquely recognizes a person, either on its own or in
conjunction with other information. Which of the following types of regulated
information is this?
A) Personally
identifiable information

44) Which of the following international Organization
for standardization (ISO) standards covers the following topics?
> Removal and return of cloud service customer
assets upon contract termination
> Protection and separation of a customer’s virtual
enviroment
> virtual machine hardening requiredments to meet
business needs
A) 27017

45) Which of the following helps to determine the
compliance, security, and privacy guidefine during cloud assessment?
A) Feasibility
study

46) Which of the following services do managed service
providers (MSPs) deliver?
Each correct answer epresents a complete solution. Choose
all that apply.
A)
1. Backup and
recovery
2. Performance
testing

47) Which of the following is an act locating
weaknesses and vulnerablities of information systems by copying the intent and
actions of malicious hackers?
A) Penetration
testing

48) Which of the following cloud storage types allows an
operating system to modify one portion one of a file without opening the entire
file?
A) Block

49) Which cloud concept makes networks more agile by
separating the forwarding of network packets for the logical decission-making
process?
A) Software
-define networking

50) Which of the following is defined by the health
insurance portability and Accountability Act (HIPAA) and must be protected by
an organization the jurisdiction of HIPAA?
A) Protected
health information

51. Bob, a user, enters a username and password at the beginning of a
session and accesses multiple applications. He does not need to re-authenticate
for accessing each application each application. Which of the following
authentication processes is he using?
A) Single sign-on

A) platform as a service

A) Chargeback

54.
Which of the following are benefits of using an open- source cloud
solution?
Each correct answer represents a complete
solution. Choose two.
A)
1. Flexibility in development
2. Faster updates

55. George is a senior cloud architect at BIgCo. He is working on a
project to interconnect his company’s private data
center to cloud company that offers e-mail and other services that can provide burstable compute
capacity. What type of cloud deployment model is he creating
A) Hybrid

56. which of the following are
example of the free-for–use software license?
Each correct answer represents a complete solution. Choose all that
apply
Linux
Apache

57. How many classification levels are there in the risk classification
system?
A) Five

58. You are working as a cloud engineer at Congruence Corp. Management
has asked you to run a small cloud evaluation in the production environment to
see if there any application compatibility issues. What will you use to
accomplish this task?
A) Pilot

59. what are the benefits of using digital marketing?
A) Campaign automation and integration
Real-time results, monitoring and
optimization

60. John works as a security analyst at XYZ. His organization uses
Telnet for remote
Management. To ensure more secure client-server connections. He
recognizes a
Necessity to replace Telnet with an encrypted network protocol. What
should
He use to accomplish this task?
A)Secure shell
61. Which of the
following is a short-term process designed to have employees develop skills or
obtain knowledge to perform their jobs?
A) Training

62. You are
working as a software engineer at XYZ. You just received an email reporting
suspicious activity from the CEO’s account. The email provides a link to review
the suspicious activity and immediately lock the account. You want review the
suspicious activity before manually looking the CEO’s account, so you click the
first link. Which data security principle did you just violate?
A) Integrity

63. You are
working as a cloud engineer at Congruence Corp. Management has asked you to
move the company’s extensive on-premises IT infrastructure to the cloud.
Because of the cost involved, you have decided to move some services the fiscal
year and move the rest of the services next fiscal year. Which migration
approach will you use?
A) Phased

64. After
conducting a qualitative risk assessment of her organization, Sally recommends
purchasing cybersecurity breach insurance. Which type of risk response behavior
is she recommending?
A) Transference

65. Which of the
following processes strives to make automation efficient and manageable
A) Orchestration

66) In the shared security model of the cloud, who is
responsible for securing access management and firewell configurations?
A) Clint

67) Which of the following is an agreement between
parties to engage in some specified activity. Usually for mutual benfit?
A) Contract

68. You are working as a cloud
administrator at BigCo. The company uses a financial transaction database that
updates frequently. If a natural disaster occurred any data backup older than
one hour would not be useful to the company. Which of the following should you
include in the disaster recovery plan to ensure that backups are always up to
date?
A) Recovery point objective

69. which of the following laws requires publicity traded companies to
have proper inte3rnal control structures in place to validate that their
financial statements accurately reflect their financial results?
A) Sarbanes-Oxley Act

70. what refers to a semi-public
intermediary network located between two firewalls?
A) Demilitarized zone

No comments:
Post a Comment