1. Which of the following is a cloud solution owned and managed by one company solely for that company - s use?
A) public B) hybrid C) community D) private
2. During a recent security analysis, you determined that users do not use authentication when accessing some private data. What should you do first?
A) Encrypt the dat B) Determine whether authentication can be use C) Implement complex user passwords. D) Configure the appropriate ACL for the dat
3. How are new technologies submitted for peer review to the IETF and, once approved, published as Internet standards?
A) as SLAs B) as SPDs C) as RFPs D) as RFCs
4. Your organization has decided to formally adopt a change management process, and you have been asked to design theprocess. Which of the following guidelines should be part of this new process?
A) Only critical changes should be fully analyze B) Change steps should be developed only for complicatedchanges. C) After formal approval, all costs and effects ofimplementation should be reviewe D) All changes should be formally requeste
5. Users on your organization - s network need to be able to access several confidential files located on a file server. Currently, the files are encrypted. Recently, it was discovered that attackers were able to change the contents of the file. You need to use a hash function to calculate the hash values of the correct files. Which of the following should you not use?
A) ECC B) SHA-2 C) RIPEMD-160 D) MD6
1. Right Answer: D Explanation: A private cloud is a solution owned and managed by one company solely for that company s use. It provides the most control and security but also requires the biggest investment in both hardware and expertise.
2. Right Answer: B Explanation: You should first determine whether authentication can be used. Users should use authentication when accessing private or confidential data.
3. Right Answer: D Explanation: The IETF is responsible for creating requests for comments (RFCs) that describe research and innovations on the Internet and its systems. Most RFCs are submitted for peer review, and, once approved, are published as Internet standards.
4. Right Answer: D Explanation: All changes should be formally requested. The following are some change management guidelines: Each request should be analyzed to ensure that it supports all goals and policies. Prior to formal approval, all costs and effects of the methods of implementation should be reviewed. After changes are approved, the change steps should be developed. During implementation, incremental testing should occur, and it should rely on a predetermined fallback strategy, if necessary. Complete documentation should be produced and submitted with a formal report to management.
5. Right Answer: A Explanation: ECC is not a hash function. It is an asymmetric algorithm. All the other options are hash functions.
Leave a comment