Black Friday Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

examstrack slider

Get Certified: Proven Methods to Pass the Exin CLOUDF Exam

Questions 11

What is an important limitation of Cloud computing?

Options:

A.

actuality of data

B.

inflexibility

C.

regulatory concerns

D.

volume of waste

Buy Now
Questions 12

What does moving to a Cloud environment mean for storage capability?

Options:

A.

Storage capability can be easily added

B.

Storage capability guarantees restoration of any previous version

C.

Storage capability is limited

D.

Storage capability provides data integrity

Buy Now
Questions 13

In the 2010 white paper Top Threats to Cloud Computing, what does the Cloud Security Alliance (CSA) identify as remediation for unknown risk profile and account?

Options:

A.

Good Human Resource vetting procedures

B.

Good SLA structures including Cloud provider compliance audits

C.

Proper testing methods

D.

Strong authentication and access control

Buy Now
Questions 14

How could presence be used to enhance security in the Cloud?

Options:

A.

by prohibiting users to access cloud applications, except when on their work place

B.

by prohibiting users to access cloud applications at their work place

C.

by restricting access to applications, depending on the user's physical location

D.

by using a web cam to identify the user of a cloud application

Buy Now
Questions 15

What is a benefit of virtual client operating systems in protection against virus infections?

Options:

A.

A virus infection in one operating system will not infect the other operating systems.

B.

One virus scanner on a client operating system will protect all other operating systems.

C.

The client operating systems are virtual and cannot be infected from outside.

D.

The client operating systems can be protected by the virus scanner of the host operating system.

Buy Now
Questions 16

What is a specific feature of Network Attached Storage (NAS)?

Options:

A.

NAS presents data to the user as if it is stored on a file server

B.

NAS uses the file system of the client computers.

C.

The NAS operating system does not provide security features.

D.

With NAS the file system is managed by the servers storing the data.

Buy Now
Questions 17

Restricting access to systems/applications based on time is part of which Triple-A security cornerstone?

Options:

A.

Accounting

B.

Application

C.

Authentication

D.

Authorization

Buy Now
Questions 18

How can a protocol analyzer be used?

Options:

A.

to analyze errors in the protocol syntax used in a failed message

B.

to distribute messages according to the addressing protocol they use

C.

to measure the bandwidth required for different types of transactions

D.

to prevent virus infections in the network software

Buy Now
Questions 19

In identity management, how might location information be used?

Options:

A.

to determine the user’s native language

B.

to determine whether the user is connected via a mobile platform

C.

to provide advertisements for local restaurants, determined by GPS

D.

to provide the correct version of the application for the user’s operating system

Buy Now
Questions 20

Providing a user access to an application in the Cloud requires several steps. In which step are the user's permissions determined?

Options:

A.

during the auditing phase

B.

during the authentication phase

C.

during the authorization phase

D.

during the verification phase

Buy Now