A+
Which value can be achieved by the ability to pool resources in cloud computing?
resource aggregation
economies of scale and agility
application consolidation
elasticity
economies of scale and agility
Which cloud solution is hosted in-house and usually is supported by a third party?
distributed workforce
cloud infrastructure
on-premises
infrastructure as a service
on-premises
Which software development concept that also has been applied more generally to IT
says that additional future costs for rework are anticipated due to an earlier decision or
course of action that was necessary for agility but was not necessarily the most optimal
or appropriate decision or course of action?
role-based access control
technical debt
software lifecycle
runtime environment
technical debt
In which cloud service model are customers responsible for securing their virtual
machines and the virtual machine operating systems, and for operating system runtime
environments, application software, and application data?
platform as a service (PaaS)
identity as a service (IaaS)
software as a service (SaaS)
infrastructure as a service (IaaS)
infrastructure as a service (IaaS)
Which type of hypervisor is hosted and runs within an operating system environment?
Type 1
Type 2
Type 3
Type 4
Type 2
Which cloud security best practice is deployed to ensure that every person who views or
works with your data has access only to what is absolutely necessary?
, set appropriate privileges
keep cloud software updated
build security policies and best practices into cloud images
review default settings
set appropriate privileges
Which security consideration is associated with inadvertently missed anti-malware and
security patch updates to virtual machines?
hypervisor vulnerabilities
VM sprawl
dormant VMs
intra-VM communications
dormant VMs
Which cloud security compliance requirement uses granular policy definitions to govern
access to SaaS applications and resources in the public cloud and to apply network
segmentation?
access governance
compliance auditing
configuration governance
real-time discovery
access governance
Which DevOps CI/CD pipeline feature requires developers to integrate code into a
repository several times per day for automated testing?
continuous delivery
continuous deployment
continuous identity
continuous integration
continuous integration
Which phased approach of hybrid cloud security requires networking and security
solutions that not only can be virtualized but also are virtualization-aware and can
dynamically adjust as necessary to address communication and protection
requirements, respectively?
consolidation servers within trust levels
dynamic computing fabric
consolidation servers across trust levels
selective network security virtualization
dynamic computing fabric
Which SASE security-as-a-service layer capability provides visibility into SaaS
application use, understands where sensitive data resides, enforces company policies
for user access, and protects data from hackers?
secure web gateway (SWG)