In which of the following cloud services will the customer be responsible for securing provisioned hosts?
A. PaaS
B. IaaS
C. SaaS
D. DaaS
Which of the following uses the business model of shared resources in a cloud environment?
A. Elasticity
B. Self-serve
C. Cloud bursting
D. Multi-tenancy
Which of the following RAID configuration would be used to accomplish disk mirroring with two disks?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
A company with an online store website has migrated the website and store database information to a cloud provider. The company wants to ensure credit cards used for online store purchases are processed such that local compliance regulations are met. Which of the following is used by a third party to verify the cloud vendor is meeting the compliance standards?
A. Replication consistency
B. Penetration test
C. Bandwidth assessment
D. Application delivery
Which of the following cloud delivery models is deployed over a company intranet or company- hosted datacenter?
A. Private cloud
B. Hybrid cloud
C. Community cloud
D. Public cloud
Which of the following protocols could be used to identify the OS version installed on a server?
A. WMI
B. IMAP
C. TLS
D. SMTP
Which of the following would assist in preventing malware from spreading in a cloud environment?
A. Software-based firewall
B. Deploy DMZ
C. Implement a honeypot
D. Antivirus software
Which of the following may be used to provide certificate management within an organization?
A. SSH
B. IPSec
C. Kerberos
D. PKI
Joe, an administrator, has just added a new VM to a production network. Joe's workstation is connecting into the environment from a VPN. Other VMs on the same subnet are open to connections, however the new VM is inaccessible by RDP, SSH, or ping from Joe's workstation. Joe can ping other systems on the production network while connected into the new VM by console. Which of the following is the MOST likely source of the problem?
A. VPN gateway
B. Firewall ACL
C. VLAN tag
D. SSL certificate
Which of the following BEST describes a copy of data?
A. Access control
B. Replicas
C. Metadata
D. Extended metadata