- (Exam Topic 1)
The use of which of the following technologies will NOT require the security dependency of an operating system, other than its own?
Correct Answer:
B
- (Exam Topic 2)
Which of the following is a method for apportioning resources that involves setting maximum usage amounts for all tenants/customers within the environment?
Response:
Correct Answer:
D
- (Exam Topic 2)
The Cloud Security Alliance’s (CSA’s) Cloud Controls Matrix (CCM) addresses all the following security architecture elements except ______.
Response:
Correct Answer:
D
- (Exam Topic 1)
Application virtualization can typically be used for .
Correct Answer:
D
- (Exam Topic 2)
Which of the following is the correct name for Tier II of the Uptime Institute Data Center Site Infrastructure Tier Standard Topology?
Response:
Correct Answer:
D