Home
You may like this!
11.
Which of the following data storage types are associated or used with Platform as a Service (PaaS)?
  • A.
    Databases and Big Data
  • B.
    SaaS application
  • C.
    Tabular
  • D.
    Raw and block
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
PaaS uses databases and Big Data storage types.
Report
Name Email  
12.
What is the term used for software technology that encapsulates application software from the underlying operating system on which it is executed?
  • A.
    Hypervisor
  • B.
    Application virtualization
  • C.
    VMWare
  • D.
    SaaS
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
Application virtualization encapsulates application software from the underlying operating system on which it is executed.
Report
Name Email  
13.
Which of the following represents the legislation enacted to protect shareholders and the public from enterprise accounting errors and fraudulent practices?
  • A.
    PCI
  • B.
    Gramm-Leach-Bliley Act (GLBA)
  • C.
    Sarbanes-Oxley Act (SOX)
  • D.
    HIPAA
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The Sarbanes-Oxley Act (SOX) was enacted in response to the 2000 accounting scandal that caused the bankruptcy of Enron. At that time, top executives laid the claim that they were unaware of the accounting practices that led to the company’s demise. SOX not only forces executives to oversee all accounting practices, but holds them accountable should such activity occur again.
Report
Name Email  
14.
What is a device called that can safely store and manage encryption keys and is used in servers, data transmission, and log files?
  • A.
    Private key
  • B.
    Hardware security module (HSM)
  • C.
    Public key
  • D.
    Trusted Operating System Module (TOS)
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A hardware security module is a device that can safely store and manage encryption keys. These can be used in servers, workstations, and so on. Once common type is called the Trusted Platform Module (TPM) and can be found on enterprise workstations and laptops. There is no such term as a trusted operating system, and public and private keys are terms used with PKI.
Report
Name Email  
15.
What is a type of cloud infrastructure that is provisioned for open use by the general public and is owned, managed, and operated by a business, academic, or government organization and exists on the premises of the cloud provider called?
  • A.
    Private cloud
  • B.
    Public cloud
  • C.
    Hybrid cloud
  • D.
    Personal cloud
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
This is the very definition of public cloud computing.
Report
Name Email