00:00

QUESTION 61

- (Exam Topic 2)
Which of the following is a restriction that can be enforced by information rights management (IRM) that is not possible for traditional file system controls?

Correct Answer: D
IRM allows an organization to control who can print a set of information. This is not be possible under traditional file system controls, where if a user can read a file, they are able to print it as well.

QUESTION 62

- (Exam Topic 3)
With a cloud service category where the cloud customer is responsible for deploying all services, systems, and components needed for their applications, which of the following storage types are MOST likely to be available to them?

Correct Answer: B
The question is describing the Infrastructure as a Service (IaaS) cloud offering, and as such, the volume and object storage types will be available to the customer. Structured and unstructured are storage types associated with PaaS, and although the other answers present similar-sounding storage types, they are a mix of real and fake names.

QUESTION 63

- (Exam Topic 2)
Which of the cloud cross-cutting aspects relates to the assigning of jobs, tasks, and roles, as well as to ensuring they are successful and properly performed?

Correct Answer: B
Governance at its core is the idea of assigning jobs, takes, roles, and responsibilities and ensuring they are satisfactory performed.

QUESTION 64

- (Exam Topic 2)
With software-defined networking, what aspect of networking is abstracted from the forwarding of traffic?

Correct Answer: C
With software-defined networking (SDN), the filtering of network traffic is separated from the forwarding of
network traffic so that it can be independently administered.

QUESTION 65

- (Exam Topic 2)
What concept does the "D" represent with the STRIDE threat model?

Correct Answer: B
Any application can be a possible target of denial-of-service (DoS) attacks. From the application side, the developers should minimize how many operations are performed for non-authenticated users. This will keep the application running as quickly as possible and using the least amount of system resources to help minimize the impact of any such attacks.