Question.26 Which of the following roles is responsible for overseeing customer relationships and the processing of financial transactions? (A) Cloud service manager (B) Cloud service deployment (C) Cloud service business manager (D) Cloud service operations manager |
26. Click here to View Answer
Correct Answer: C
The cloud service business manager is responsible for overseeing business plans and customer relationships as well as processing financial transactions.
Question.27 Which protocol does the REST API depend on? (A) HTTP (B) XML (C) SAML (D) SSH |
27. Click here to View Answer
Correct Answer: A
Representational State Transfer (REST) is a software architectural scheme that applies the components, connectors, and data conduits for many web applications used on the Internet. It uses and relies on the HTTP protocol and supports a variety of data formats.
Question.28 Which United States program was designed to enable organizations to bridge the gap between privacy laws and requirements of the United States and the European Union? (A) GLBA (B) HIPAA (C) Safe Harbor (D) SOX |
28. Click here to View Answer
Correct Answer: C
Due to the lack of an adequate privacy law or protection at the federal level in the United States, European privacy regulations generally prohibit the exporting or sharing of PII from Europe with the United States. Participation in the Safe Harbor program is voluntary on behalf of an organization, but it does require them to conform to specific requirements and policies that mirror those from the EU. Thus, organizations can fulfill requirements for data sharing and export and possibly serve customers in the EU.
Question.29 What is the biggest benefit to leasing space in a data center versus building or maintain your own? (A) Certification (B) Costs (C) Regulation (D0 Control |
29. Click here to View Answer
Correct Answer: B
When leasing space in a data center, an organization can avoid the enormous startup and building costs associated with a data center, and can instead leverage economies of scale by grouping with other organizations and sharing costs.
Question.30 Which of the following security measures done at the network layer in a traditional data center are also applicable to a cloud environment? (A) Dedicated switches (B) Trust zones (C) Redundant network circuits (D) Direct connections |
30. Click here to View Answer
Correct Answer: B
Trust zones can be implemented to separate systems or tiers along logical lines for great security and access controls. Each zone can then have its own security controls and monitoring based on its particular needs.