What should be the guiding principle of data ownership when using a service provider?
What should be the guiding principle of data ownership when using a service provider?
Which environment presents the highest risk to corporate information given the Patriot Act?
The Patriot Act is a law that, under special circumstances, allows warrantless search and seizure
of information. Which environment presents the highest risk to corporate information given the
Patriot Act?
This is the correct order of steps in the recommended risk assessment process?
This is the correct order of steps in the recommended risk assessment process?
1. Quick risk (L/M/H) check
2. Mitigation
3. Full risk assessment
4. Deploy
5. Evaluate
Why is there a need for a full risk assessment if a quick risk assessment has already been performed?
Why is there a need for a full risk assessment if a quick risk assessment has already been
performed?
Where should you look first for assessment criteria and methodologies?
A company has asked you to develop a framework for assuring trust in the VDC. An assessment
methodology is to be part of the framework.
Where should you look first for assessment criteria and methodologies?
What could delay a virtualization or cloud initiative?
What could delay a virtualization or cloud initiative?
What is (are) included in internal and external attestation?
What is (are) included in internal and external attestation?
Which feature should the administrator have implemented to achieve their goal?
An administrator has implemented a hypervisor cluster with high availability enabled. They are
expecting that if any of the physical servers fail, the virtual servers will be transparently migrated to
other hypervisors in the cluster.
When the first hypervisor failure occurs, all of the hosted virtual servers appear offline to users as
they are moved to another host.
Which feature should the administrator have implemented to achieve their goal?
Which feature should be utilized?
A company wants to ensure that their critical application can fail over to another physical host
within the cluster without disruption.
Which feature should be utilized?
What is a likely outcome if a disaster were to occur at the primary site?
Applications of different criticality have been deployed on a collection of virtual servers. In an effort
to save cost, a business continuity plan has been devised to provide half the number of physical
servers to host the virtual machines at the disaster recovery site.
What is a likely outcome if a disaster were to occur at the primary site?