Question.6 Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system? (A) Reference monitor (B) Trusted Computing Base (TCB) (C) Time separation (D) Security kernel |
6. Click here to View Answer
Correct Answer: D
Question.7 What process facilitates the balance of operational and economic costs of protective measures with gains in mission capability? (A) Performance testing (B) Risk assessment (C) Security audit (D) Risk management |
7. Click here to View Answer
Correct Answer: D
Question.8 Clothing retailer employees are provisioned with user accounts that provide access to resources at partner businesses. All partner businesses use common identity and access management (IAM) protocols and differing technologies. Under the Extended Identity principle, what is the process flow between partner businesses to allow this IAM action? (A) Clothing retailer acts as User Self Service, confirms identity of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to services. (B) Clothing retailer acts as identity provider (IdP), confirms identity of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to services. (C) Clothing retailer acts as Service Provider, confirms identity of user using industry standards, then sends credentials to partner businesses that act as an identity provider (IdP) and allows access to resources. (D) Clothing retailer acts as Access Control Provider, confirms access of user using industry standards, then sends credentials to partner businesses that act as a Service Provider and allows access to resources. |
8. Click here to View Answer
Correct Answer: B
Question.9 Which of the following statements BEST describes least privilege principle in a cloud environment? A. A single cloud administrator is configured to access core functions. B. Internet traffic is inspected for all incoming and outgoing packets. C. Routing configurations are regularly updated with the latest routes. D. Network segments remain private if unneeded to access the internet. |
9. Click here to View Answer
Correct Answer: D
Question.10 An organization has been collecting a large amount of redundant and unusable data and filling up the storage area network (SAN). Management has requested the identification of a solution that will address ongoing storage problems. Which is the BEST technical solution? A. Compression B. Caching C. Replication D. Deduplication |
10. Click here to View Answer
Correct Answer: D