User access control consists of which of the following? (Choose four.)

User access control consists of which of the following? (Choose four.)


A. Role-based administration
B. Discretionary
C. Multifactor
D. Guest accounts
E. User credentials
F. Federation


Answer: Role-Based Administration, Discretionary, Multifactor, Federation

Hardening a server system can include which of the following? (Choose three.)

Hardening a server system can include which of the following? (Choose three.)


A. Installing security software
B. Installing service packs
C. Using federations
D. Configuring user credentials
E. Using ciphers


Answer: Installing Security Software, Installing Service Packs, Configuring User Credentials

A _______ is a special security zone that contains servers that need to be accessed by the outside world via the Internet and also internally; it is a special network security zone that exposes cloud computers to the Internet.

A _______ is a special security zone that contains servers that need to be accessed by the outside world via the Internet and also internally; it is a special network security zone that exposes cloud computers to the Internet.



Answer: DMZ

What is Path Traversal?

What is Path Traversal?



Answer: The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

What is a Buffer Overflow?

What is a Buffer Overflow?



Answer: The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

What is an Open Redirect?

What is an Open Redirect?



Answer: A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.

What is Cross-Site Request Forgery (CSRF)?

What is Cross-Site Request Forgery (CSRF)?



Answer: The web application does not, or cannot, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

What is Unrestricted File Upload?

What is Unrestricted File Upload?



Answer: The software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

What is Cross-Site Scripting (XSS)?

What is Cross-Site Scripting (XSS)?



Answer: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

What is OS Command Injection and how can it be mitigated?

What is OS Command Injection and how can it be mitigated?



Answer: The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

What is SQL Injection?

What is SQL Injection?



Answer: The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

An organization can address regulatory compliance risks in the cloud in all the following ways except which one?

An organization can address regulatory compliance risks in the cloud in all the following ways except which one?


A. Its own security policies
B. Periodic audits
C. Service-level agreements with cloud providers
D. Delegation of full responsibility for compliance to the cloud service provider


Answer: Delegation of full responsibility for compliance to the cloud service provider

Which countries could claim jurisdiction over data in the cloud?

Which countries could claim jurisdiction over data in the cloud?




A. The country in which physical servers storing data reside
B. The countries that data passes through between the provider's servers
C. The country in which the data owner resides
D. All of the above


Answer: All of the Above

Since there is a finite supply of server resources and there are many virtual machines that can consume these resources, it becomes very important that what TWO things be assigned to prevent a few VMs from monopolizing all the available resources?

Since there is a finite supply of server resources and there are many virtual machines that can consume these resources, it becomes very important that what TWO things be assigned to prevent a few VMs from monopolizing all the available resources?




A. OIDs
B. limits
C. IPMI
D. Quotas


Answer: Limits, IPMI

Which data replication process occurs in real time?

Which data replication process occurs in real time?



A. Asynchronous replication
B. Archiving
C. Synchronous replication
D. Site mirroring


Answer: Synchronous Replication

What are three examples of multipath technologies?

What are three examples of multipath technologies?



A. TRILL
B. High availability
C. SAN_A/SAN_B
D. Spanning tree
E. Link aggregation


Answer: TRILL, SAN_A/SAN_B, Link Aggregation

Which data replication process is scheduled?

Which data replication process is scheduled?



A. Asynchronous replication
B. Archiving
C. Synchronous replication
D. Site mirroring


Answer: Asynchronous Replication

What is it called when you disperse the cloud deployment to multiple dispersed cloud hosting datacenters so that if one facility experiences a disruption your cloud services will remain accessible in other locations?

What is it called when you disperse the cloud deployment to multiple dispersed cloud hosting datacenters so that if one facility experiences a disruption your cloud services will remain accessible in other locations?



A. High availability
B. Archiving
C. RTO
D. Geographical diversity
E. Site mirroring


Answer: Site Mirroring

With ______, the data is first written to the primary storage system in the primary storage facility or cloud location. After the data is stored, it is then copied to remote replicas on a scheduled basis or at near real time.

With ______, the data is first written to the primary storage system in the primary storage facility or cloud location. After the data is stored, it is then copied to remote replicas on a scheduled basis or at near real time.



Answer: Asynchronous Replication

What type of application design is preferable for a cloud-based application?

What type of application design is preferable for a cloud-based application?




A. A design that uses stateful objects
B. A design that uses stateless objects
C. A design that uses in-memory state management
D. A design that uses client-based state management


Answer: A design that uses stateless objects

What is the main limitation of a desktop application?

What is the main limitation of a desktop application?




A. Lack of manageability
B. Lack of reliability
C. Lack of security
D. Lack of scalability


Answer: Lack of Scalability

When migrating from your local datacenter to a cloud network, it is sometimes necessary to copy an image of the server and send it to the cloud provider in a physical media for installation. This is known as a(n) ___ migration.

When migrating from your local datacenter to a cloud network, it is sometimes necessary to copy an image of the server and send it to the cloud provider in a physical media for installation. This is known as a(n) ___ migration.



Answer: Offline

What is the name given to the type of software that enables a server to be logically abstracted and appear to the operating system running on it as if it is running directly on the server hardware itself?

What is the name given to the type of software that enables a server to be logically abstracted and appear to the operating system running on it as if it is running directly on the server hardware itself?



A. Virtualization
B. Abstraction
C. Hypervisor
D. Volumes


Answer: Hypervisor