21.
Which of the following is always safe to use in the disposal of electronic records within a
cloud environment?
- A.Physical destruction
- B.Overwriting
- C.Encryption
- D.Degaussing
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Encryption can always be used in a cloud environment, but physical destruction, overwriting, and degaussing may not be available due to access and physical separation factors. |
22.
Which of the following describes a SYN flood attack?
- A.Rapid transmission of Internet Relay Chat (IRC) messages
- B.Creating a high number of partially open TCP connections
- C.Disabling the Domain Name Service (DNS) server
- D.Excessive list linking of users and files
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A SYN flood is where a TCP connection attempt is made and then cut short just prior to completion, thereby leaving a server waiting for a response. If enough of these connection attempts are made, a “flood” occurs, causing the end unit to consume resources to the point that either services and/or the system itself become unavailable for use. The other options have no connection with a flood of any kind. |
23.
Which of the following is an example of a form of cloud storage that applies to storing an
individual’s mobile device data in the cloud and providing the individual with access to the
data from anywhere?
- A.Raw storage
- B.Flash storage
- C.Obfuscation archiving
- D.Mobile cloud storage
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Mobile cloud storage is defi ned as a form of cloud storage that applies to storing an individual’s mobile device data in the cloud and providing the individual with access to the data from anywhere. |
24.
Which of the following terms best describes a distributed model where software applications
are hosted by a vendor or cloud service provider and made available to customers over
network resources?
- A.Infrastructure as a Service (IaaS)
- B.Public cloud
- C.Software as a Service (SaaS)
- D.Private cloud
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
This is the defi nition of the Software as a Service (SaaS) service model. Public and private are cloud deployment models, and Infrastructure as a Service (IaaS) does not provide applications of any type. |
25.
Which of the following is a federal law enacted in the United States to control the way that
financial institutions deal with private information of individuals?
- A.PCI
- B.ISO/IEC
- C.Gramm-Leach-Bliley Act (GLBA)
- D.Consumer Protection Act
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
The Gramm-Leach-Bliley Act targets U.S. fi nancial institutions and requires them to deal specifi cally with protecting account holders’ private information. PCI refers to credit card processing requirements, ISO/IEC is a standards organization, and the Consumer Protection Act, while providing oversight for the protection of consumer private information, is limited in scope. |