- (Exam Topic 4)
All the following are data analytics modes, except:
Correct Answer:
C
All the others are data analytics methods, but “refractory iterations” is a nonsense term thrown in as a red
herring.
- (Exam Topic 1)
Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?
Correct Answer:
A
Virtual private networks (VPNs) are commonly used to allow access into trust zones. Via a VPN, access can be controlled and logged and only allowed through secure channels by authorized users. It also adds an additional layer of encryption and protection to communications.
- (Exam Topic 2)
Which of the cloud cross-cutting aspects relates to the ability to reuse or move components of an application or service?
Correct Answer:
B
Interoperability is the ease with which one can move or reuse components of an application or service. This is maximized when services are designed without specific dependencies on underlying platforms, operating systems, locations, or cloud providers.
- (Exam Topic 1)
What are the two protocols that TLS uses?
Correct Answer:
A
TLS uses the handshake protocol to establish and negotiate the TLS connection, and it uses the record protocol for the secure transmission of data.
- (Exam Topic 1)
Which protocol does the REST API depend on?
Correct Answer:
A
Representational State Transfer (REST) is a software architectural scheme that applies the components, connectors, and data conduits for many web applications used on the Internet. It uses and relies on the HTTP protocol and supports a variety of data formats.