New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Exin CLOUDF Practice Exam with Questions & Answers | Set: 2

Questions 11

What is an important limitation of Cloud computing?

Options:
A.

actuality of data

B.

inflexibility

C.

regulatory concerns

D.

volume of waste

Exin CLOUDF Premium Access
Questions 12

What does moving to a Cloud environment mean for storage capability?

Options:
A.

Storage capability can be easily added

B.

Storage capability guarantees restoration of any previous version

C.

Storage capability is limited

D.

Storage capability provides data integrity

Questions 13

In the 2010 white paper Top Threats to Cloud Computing, what does the Cloud Security Alliance (CSA) identify as remediation for unknown risk profile and account?

Options:
A.

Good Human Resource vetting procedures

B.

Good SLA structures including Cloud provider compliance audits

C.

Proper testing methods

D.

Strong authentication and access control

Questions 14

How could presence be used to enhance security in the Cloud?

Options:
A.

by prohibiting users to access cloud applications, except when on their work place

B.

by prohibiting users to access cloud applications at their work place

C.

by restricting access to applications, depending on the user's physical location

D.

by using a web cam to identify the user of a cloud application

Questions 15

What is a benefit of virtual client operating systems in protection against virus infections?

Options:
A.

A virus infection in one operating system will not infect the other operating systems.

B.

One virus scanner on a client operating system will protect all other operating systems.

C.

The client operating systems are virtual and cannot be infected from outside.

D.

The client operating systems can be protected by the virus scanner of the host operating system.

Questions 16

What is a specific feature of Network Attached Storage (NAS)?

Options:
A.

NAS presents data to the user as if it is stored on a file server

B.

NAS uses the file system of the client computers.

C.

The NAS operating system does not provide security features.

D.

With NAS the file system is managed by the servers storing the data.

Questions 17

Restricting access to systems/applications based on time is part of which Triple-A security cornerstone?

Options:
A.

Accounting

B.

Application

C.

Authentication

D.

Authorization

Questions 18

How can a protocol analyzer be used?

Options:
A.

to analyze errors in the protocol syntax used in a failed message

B.

to distribute messages according to the addressing protocol they use

C.

to measure the bandwidth required for different types of transactions

D.

to prevent virus infections in the network software

Questions 19

In identity management, how might location information be used?

Options:
A.

to determine the user’s native language

B.

to determine whether the user is connected via a mobile platform

C.

to provide advertisements for local restaurants, determined by GPS

D.

to provide the correct version of the application for the user’s operating system

Questions 20

Providing a user access to an application in the Cloud requires several steps. In which step are the user's permissions determined?

Options:
A.

during the auditing phase

B.

during the authentication phase

C.

during the authorization phase

D.

during the verification phase