Cohort 9 Day 4

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Which of the following roles, according to the shared responsibility model, is responsible for securing

the company’s database in an IaaS model for a cloud environment?


A. Client
B. Third-party vendor
C. Cloud provider
D. DBA

A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations.
Which of the following should the hosting provider consider first?
A. Local data protection regulations
B. Risks from hackers residing in other countries
C. Impacts to existing contractual obligations
D. Time zone differences in log correlation
A systems administrator is looking for a low-cost application-hosting solution that is cloud-based.
Which of the following meets these requirements?
A. Serverless framework
B. Type 1 hvpervisor
C. SD-WAN
D. SDN

Which of the following should a systems administrator use to ensure an easy deployment of
resources within the cloud provider?
A. Software as a service
B. Infrastructure as code
C. Internet of Things
D. Software-defined networking
An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of
the following would be most relevant for the analyst to evaluate?
A. Secured zones
B. Subject role
C. Adaptive identity
D. Threat scope reduction

A systems administrator is working on a solution with the following requirements:


• Provide a secure zone.
• Enforce a company-wide access control policy.
• Reduce the scope of threats.
Which of the following is the systems administrator setting up?
A. Zero Trust
B. AAA
C. Non-repudiation
D. CIA
Which of the following would most likely mitigate the impact of an extended power outage on a
company's environment?
A. Hot site
B. UPS
C. Snapshots
D. SOAR

A company requires hard drives to be securely wiped before sending decommissioned systems to
recycling. Which of the following best describes this policy?
A. Enumeration
B. Sanitization
C. Destruction
D. Inventory
company has begun labeling all laptops with asset inventory stickers and associating them with
employee IDs. Which of the following security benefits do these actions provide? (Choose two.)
A. If a security incident occurs on the device, the correct employee can be notified.
B. The security team will be able to send user awareness training to the appropriate device.
C. Users can be mapped to their devices when configuring software MFA tokens.
D. User-based firewall policies can be correctly targeted to the appropriate laptops.
E. When conducting penetration testing, the security team will be able to target the desired laptops.
F. Company data can be accounted for when the employee leaves the organization

A company is discarding a classified storage array and hires an outside vendor to complete the
disposal. Which of the following should the company request from the vendor?
A. Certification
B. Inventory list
C. Classification
D. Proof of ownership
Which of the following actions could a security engineer take to ensure workstations and servers are
properly monitored for unauthorized changes and software?
A. Configure all systems to log scheduled tasks.
B. Collect and monitor all traffic exiting the network.
C. Block traffic based on known malicious signatures.
D. Install endpoint management software on all systems.
An organization is building a new backup data center with cost-benefit as the primary requirement
and RTO and RPO values around two days. Which of the following types of sites is the best for this
scenario?
A.Real-time recovery
B. Hot
C. Cold
D. Warm

A company is planning a disaster recovery site and needs to ensure that a single natural disaster
would not result in the complete loss of regulated backup dat
a. Which of the following should the company consider?
A. Geographic dispersion
B. Platform diversity
C. Hot site
D. Load balancing
A company that is located in an area prone to hurricanes is developing a disaster recovery plan and
looking at site considerations that allow the company to immediately continue operations. Which of
the following is the best type of site for this company?
A. Cold
B. Tertiary
C. Warm
D. Hot

A company is developing a business continuity strategy and needs to determine how many staff
members would be required to sustain the business in the case of a disruption. Which of the
following best describes this step?
A. Capacity planning
B. Redundancy
C. Geographic dispersion
D. Tablet exercise
security manager created new documentation to use in response to various types of security
incidents. Which of the following is the next step the manager should take?
A. Set the maximum data retention policy.
B. Securely store the documents on an air-gapped network.
C. Review the documents' data classification policy.
D. Conduct a tabletop exercise with the team

A company is concerned about weather events causing damage to the server room and downtime.
Which of the following should the company consider?
A. Clustering servers
B. Geographic dispersion
C. Load balancers
D. Off-site backups
Visitors to a secured facility are required to check in with a photo ID and enter the facility through an
access control vestibule Which of the following but describes this form of security control?
A. Physical
B. Managerial
C. Technical
D. Operational

Which of the following is the best way to secure an on-site data center against intrusion from an
insider?
A. Bollards
B. Access badge
C. Motion sensor
D. Video surveillance
To improve the security at a data center, a security administrator implements a CCTV system and
posts several signs about the possibility of being filmed. Which of the following best describe these
types of controls? (Select two).
A.Preventive
B.Deterrent
C.Corrective
D.Directive
E.Compensating
F.Detective

Which of the following would be the best ways to ensure only authorized personnel can access a
secure facility? (Select two).
A. Fencing
B. Video surveillance
C. Badge access
D. Access control vestibule
E. Sign-in sheet
F. Sensor

You might also like