PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following BEST balances the security risk and IT drivers for cloud computing?

The organization has an IT driver on cloud computing to improve delivery times for IT solution
provisioning. Separate to this initiative, a business case has been approved for replacing the
existing banking platform for credit card processing with a newer offering. It is the security
practitioner’s responsibility to evaluate whether the new credit card processing platform can be
hosted within a cloud environment. Which of the following BEST balances the security risk and IT
drivers for cloud computing?

Which of the following will MOST likely result in some IT resources not being integrated?

The Universal Research Association has just been acquired by the Association of Medical
Business Researchers. The new conglomerate has funds to upgrade or replace hardware as part
of the acquisition, but cannot fund labor for major software projects. Which of the following will
MOST likely result in some IT resources not being integrated?

what point in the implementation process should this problem have been discovered?

A large enterprise introduced a next generation firewall appliance into the Internet facing DMZ. All
Internet traffic passes through this appliance. Four hours after implementation the network
engineering team discovered that traffic through the DMZ now has un-acceptable latency, and is
recommending that the new firewall be taken offline. At what point in the implementation process

should this problem have been discovered?

Which of the following should the security administrator provide to opposing council?

A company has implemented data retention policies and storage quotas in response to their legal
department’s requests and the SAN administrator’s recommendation. The retention policy states
all email data older than 90 days should be eliminated. As there are no technical controls in place,
users have been instructed to stick to a storage quota of 500Mb of network storage and 200Mb of
email storage. After being presented with an e-discovery request from an opposing legal council,
the security administrator discovers that the user in the suit has 1Tb of files and 300Mb of email
spanning over two years. Which of the following should the security administrator provide to
opposing council?