Home
You may like this!
21.
Which of the following is always safe to use in the disposal of electronic records within a cloud environment?
  • A.
    Physical destruction
  • B.
    Overwriting
  • C.
    Encryption
  • D.
    Degaussing
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Encryption can always be used in a cloud environment, but physical destruction, overwriting, and degaussing may not be available due to access and physical separation factors.
Report
Name Email  
22.
Which of the following describes a SYN flood attack?
  • A.
    Rapid transmission of Internet Relay Chat (IRC) messages
  • B.
    Creating a high number of partially open TCP connections
  • C.
    Disabling the Domain Name Service (DNS) server
  • D.
    Excessive list linking of users and files
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A SYN flood is where a TCP connection attempt is made and then cut short just prior to completion, thereby leaving a server waiting for a response. If enough of these connection attempts are made, a “flood” occurs, causing the end unit to consume resources to the point that either services and/or the system itself become unavailable for use. The other options have no connection with a flood of any kind.
Report
Name Email  
23.
Which of the following is an example of a form of cloud storage that applies to storing an individual’s mobile device data in the cloud and providing the individual with access to the data from anywhere?
  • A.
    Raw storage
  • B.
    Flash storage
  • C.
    Obfuscation archiving
  • D.
    Mobile cloud storage
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Mobile cloud storage is defi ned as a form of cloud storage that applies to storing an individual’s mobile device data in the cloud and providing the individual with access to the data from anywhere.
Report
Name Email  
24.
Which of the following terms best describes a distributed model where software applications are hosted by a vendor or cloud service provider and made available to customers over network resources?
  • A.
    Infrastructure as a Service (IaaS)
  • B.
    Public cloud
  • C.
    Software as a Service (SaaS)
  • D.
    Private cloud
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
This is the defi nition of the Software as a Service (SaaS) service model. Public and private are cloud deployment models, and Infrastructure as a Service (IaaS) does not provide applications of any type.
Report
Name Email  
25.
Which of the following is a federal law enacted in the United States to control the way that financial institutions deal with private information of individuals?
  • A.
    PCI
  • B.
    ISO/IEC
  • C.
    Gramm-Leach-Bliley Act (GLBA)
  • D.
    Consumer Protection Act
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The Gramm-Leach-Bliley Act targets U.S. fi nancial institutions and requires them to deal specifi cally with protecting account holders’ private information. PCI refers to credit card processing requirements, ISO/IEC is a standards organization, and the Consumer Protection Act, while providing oversight for the protection of consumer private information, is limited in scope.
Report
Name Email