A+ GRADED. Buy Quality Materials!
Marry, a deployment manager works with a software development group to
assess the security of a new version of the organization's internally developed
tool. The organization prefers focusing on assessing security throughout the life
cycle. Which of the following methods should she perform to assess the security
of the product?
A Regression testing
B Unit testing
C Content filtering
D Vulnerability scanning
D Vulnerability scanning
Rhea, a network administrator, wants to create an entire virtual network with all of
the virtual devices needed to support the service or application. Which of the
following cloud models will she use to accomplish the task?
A Monitoring as a service
B Infrastructure as a service
C Platform as a service
D Software as a service
C Platform as a service
Which of the following features of cloud computing is essential to ensure an e-
commerce application can receive orders without any downtime?
A Scalability
B Pay-as-you-go
C Elasticity
D Availability
D Availability
Which law requires publicly traded companies to have proper internal control
structures in place to validate that their financial statements accurately reflect
their financial results?
A Gramm-Leach-Bliley Act
, B General Data Protection Regulation
C Federal Information Processing Standard
D Sarbanes-Oxley Act
D Sarbanes-Oxley Act
Maria, a network analyst, can connect to all the web services individually, but
each requires a different password. She wants to access web services securely
with a unique password by eliminating the overhead of entering the different
passwords for different services. Which of the following should she configure?
A Secure shell
B Single sign-on
C Server message block
D Secure socket layer
B Single sign-on
Which of the following allows clients to remotely connect to a virtual Linux
machine?
A Secure Shell
B Secure Socket Layer
C Hypertext Transfer Protocol Secure
D Remote Desktop Protocol
A Secure Shell
Which of the following is an open and distributed ledger that can securely record
transactions between two parties in a verifiable and permanent way?
A Baseline
B Containerization
C Federation
D Blockchain
D Blockchain
Which of the following is used in conjunction with a web browser and can be
used to access cloud resources?
A Secure Shell
B Transmission Control Protocol
C Simple Mail Transfer Protocol
D Hypertext Transfer Protocol Secure
D Hypertext Transfer Protocol Secure
You are working for a multinational public corporation. There are offices in China
and Germany. You are helping to deploy a chat application to be used by all three
offices. The accounting department wants to be able to use chat software. You
will also be required to save all chat communications. Which regulations do you
need to worry about?
A General data protection regulation
B Federal