1.
A company wants to streamline their reporting tools. They have decided to implement a third party SaaS cloud reporting tool to process additional data, but will continue to process confidential data internally. Which of the following deployment models is BEST suited for the company?
2.
Which of the following mitigates newly found vulnerabilities within software for an environment?
3.
Joe, an administrator, is searching through directories on his multi-tenant cloud environment when he notices he is able to access a directory holding another company's data. Which of the following should be implemented to mitigate this issue?
4.
Which of the following would be the FIRST choice to encrypt a laptop hard drive?
5.
Which of the following would be the FIRST thing to do after determining an upgrade is required for a production application server?
6.
Which of the following refers to the maximum amount of data that can be lost due to a system failure?
7.
A company that provides cloud-based storage services wants to ensure that if underlying hard disk drives are sent to the disposal facility, they will not contain any data in clear-text format. Which of the following should be done to accomplish this task?
8.
A company that provides IaaS to small business organizations needs to allow customers to control the power state of their virtual machines. Which of the following should be implemented to accomplish this task?
9.
An administrator is planning to implement multipathing for IP-based storage. Which of the following protocols can be used in this configuration?
10.
Which of the following, in conjunction with IPSec, can be configured to provide secure access to files on a NAS?