Time limit: 0
Quiz Summary
0 of 22 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 22 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.๐
Practice makes you perfect! ๐ -
Congratulations! ๐ฅณ
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.โ๏ธ
Good luck with the exam! Stay strong.๐
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 22
1. Question
You have been hired by a company to identify and document all aspects of an asset’s configurations in order to create a secure template against which all subsequent configurations will be measured. What type of configuration management will you implement?
CorrectIncorrect -
Question 2 of 22
2. Question
Your organization is working with a contractor to build a database. You need to find a way to hide the actual data from being exposed to the contractor. Which of the following technique will you use in order to allow the contractor to test the database environment without having access to actual sensitive customer information?
CorrectIncorrect -
Question 3 of 22
3. Question
The software that monitors user activity and automatically prevents malware between cloud service users and cloud applications is known as:
CorrectIncorrect -
Question 4 of 22
4. Question
Which of the following types of disaster recovery sites allows a company to continue normal business operations, within a very short period of time after a disaster?
CorrectIncorrect -
Question 5 of 22
5. Question
A company hired you as a security expert. You have been tasked to implement a solution to deceive and attract hackers who attempt to gain unauthorized access to their network in order to gain information about how they operate.
Which of the following technique will you implement to meet this requirement as cost-effective as possible?
CorrectIncorrect -
Question 6 of 22
6. Question
The developers of your company thinking to switch the development process to the cloud, so they donโt need to start from scratch when creating applications with the purpose of saving a lot of time and money on writing code.
Which of the following cloud service models the developers of your company will use to create unique, customizable software on the Cloud?
CorrectIncorrect -
Question 7 of 22
7. Question
Your company is migrating to the cloud due to a strict budget. The primary reason is to avoid spending money on purchasing hardware and time on maintaining it. The company needs to pay only for the cloud computing resources it uses.
Which of the following cloud computing architecture should your company use to deploy the cloud services?
CorrectIncorrect -
Question 8 of 22
8. Question
Which of the following companies is not a cloud service provider?
CorrectIncorrect -
Question 9 of 22
9. Question
A Managed Service Provider (MSP) is a company that remotely manages a customerโs IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model. (True/False)
CorrectIncorrect -
Question 10 of 22
10. Question
Answer the fill-in-the-blank by typing one of the following type of attacks:
Fog
ย ย ยEdge
ย ย ยDistributed
ย ย ยCloud
-
A decentralized computing infrastructure in which data, compute, storage, and applications are located between the data source and the cloud is called computing. In this environment, intelligence is at the local area network (LAN) and data is transmitted from endpoints only.
CorrectIncorrect -
-
Question 11 of 22
11. Question
The solution to the problem of how to get a software to run reliably when moved from one computing environment to another is known as:
CorrectIncorrect -
Question 12 of 22
12. Question
What type of architecture developers use to build and run applications and services without having to manage infrastructure?
CorrectIncorrect -
Question 13 of 22
13. Question
You are working for a client as a web developer and your client asked you to check the new update of the app without making the updates live for the users. In which environment will you push the update so your client can look it over in a stable format before it gets pushed to the users?
CorrectIncorrect -
Question 14 of 22
14. Question
Which of the following process is designed to trigger automatic code integration in the main code base instead of developing in isolation and then integrating them at the end of the development cycle?
CorrectIncorrect -
Question 15 of 22
15. Question
Answer the fill-in-the-blank by typing one of the following type of attacks:
Control
ย ย ยElasticity
ย ย ยScalability
ย ย ยCompiler
-
Version keeps track of every modification to the code in a special kind of database. If a mistake is made, you can turn back the clock and compare earlier versions of the code to help fix the mistake.
CorrectIncorrect -
-
Question 16 of 22
16. Question
You are developing a new system that requires users to be authenticated using temporary passcode which is generated by an algorithm that uses the current time of the day.
Which of the following authentication methods will you use to authenticate the users?
CorrectIncorrect -
Question 17 of 22
17. Question
Authentication, ______________, and Accounting is the term for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
CorrectIncorrect -
Question 18 of 22
18. Question
The security process that relies on unique traits such as retinas, irises, voices, facial characteristics, and fingerprints of an individual to verify that he is who he says he is, is called:
CorrectIncorrect -
Question 19 of 22
19. Question
Which of the following types of disaster recovery sites doesnโt have any pre-installed equipment and it takes a lot of time to properly set it up so as to fully resume business operations?
CorrectIncorrect -
Question 20 of 22
20. Question
Which of the following options is a network architecture approach that enables the network to be intelligently and centrally controlled using software applications, and helps operators manage the network consistently, regardless of the underlying network technology?
CorrectIncorrect -
Question 21 of 22
21. Question
A company collects information from customers in all possible ways through the web. Afterward, the company separates the information based on demographics and interest and resell the customer’s data to third-party companies in different countries. Which of the following concepts does the company violate?
CorrectIncorrect -
Question 22 of 22
22. Question
If an employee tried to forward a business email outside the corporate domain or upload a corporate file to a consumer cloud storage service like Google drive, the employee would be denied permission. Which of the following process is described in the above scenario?
CorrectIncorrect