1. When using ssl, the public key is found in a _______.
Answer
Correct Answer:
Digital certificate
Note: This Question is unanswered, help us to find answer for this one
2. Compared to in-house hosting, cloud-based hosting ________.
Answer
Correct Answer:
Minimizes the risk of investing in technology that will soon become obsolete
Note: This Question is unanswered, help us to find answer for this one
3. One downside to cloud storage is that ________ is needed to access your files.
Answer
Correct Answer:
Internet access
Note: This Question is unanswered, help us to find answer for this one
4. A ________ is a cloud that is owned and operated by an organization for its own benefit.
Answer
Correct Answer:
Private cloud
Note: This Question is unanswered, help us to find answer for this one
5. Which component of the Symantec Control Compliance Suite (CCS) simplifies the evaluation of procedural controls by enabling an organization to automate, publish, and analyze results from web-based surveys?
Answer
Correct Answer:
CCS Standards Manager
Note: This Question is unanswered, help us to find answer for this one
6. A company is hosting its email infrastructure in the cloud. The company is unable to enjoy the benefit of cloud deployment because its email servers process excessive spam emails. The company needs a solution that can block spam and malware contained in email messages before it reaches the email servers. Which solution resolves this issue?
Answer
Correct Answer:
Symantec Messaging Gateway
Note: This Question is unanswered, help us to find answer for this one
7. How does Symantec Endpoint Protection (SEP) maximize VM density and performance without impacting security?
Answer
Correct Answer:
SEP reduces the spread of malware by hardening VMware vCenter.
Note: This Question is unanswered, help us to find answer for this one
8. An enterprise is in the process of moving application servers to a cloud-based IaaS platform. Which technology should an IT professional use to assess the risk of the IT assets in a business context?
Answer
Correct Answer:
Symantec Control Compliance Suite
Note: This Question is unanswered, help us to find answer for this one
9. What can a hosted Symantec Data Loss Prevention solution do to protect confidential data in an outgoing email?
Answer
Correct Answer:
Add a header to an email to route to an encryption gateway
Note: This Question is unanswered, help us to find answer for this one
10. An IT security professional at a large US-based manufacturing company has decided to deploy and manage a host intrusion detection solution to assist with their migration to a cloud environment. Which cloud environment will benefit from this solution?
Answer
Correct Answer:
Multi-tenant IaaS
Note: This Question is unanswered, help us to find answer for this one
11. A cloud service provider administrator has discovered that someone is attempting to determine which servers and operating systems are running on a tenant's network by using network mapping. How is this risk categorized?
Answer
Correct Answer:
Technical
Note: This Question is unanswered, help us to find answer for this one
12. Which action addresses a risk inherent to the public cloud model?
Answer
Correct Answer:
Harden applications sufficiently for multi-tenant environments
Note: This Question is unanswered, help us to find answer for this one
13. An individual has been able to obtain "Virtual Machine User" level access on a VMware host.Which possible issue could this cause?
Answer
Correct Answer:
Virtual machines being shut down
Note: This Question is unanswered, help us to find answer for this one
14. What is the correct order used by Symantec Messaging Gateway for scanning email messages?
Answer
Correct Answer:
Message is scanned for spam > message is scanned for viruses > message is scanned for content violations and data loss
Note: This Question is unanswered, help us to find answer for this one
15. A CSO is concerned to learn that data is being intercepted while moving data between the cloud and corporate users. What should an IT professional do to mitigate this issue?
Answer
Correct Answer:
Implement data encryption
Note: This Question is unanswered, help us to find answer for this one
16. A company is planning a migration of an application to public IaaS. What is a valid objection related to data security in this scenario?
Answer
Correct Answer:
Security risks introduced by a multi-tenant cloud
Note: This Question is unanswered, help us to find answer for this one
17. Which scenario identifies assets eligible for PaaS cloud migration?
Answer
Correct Answer:
Database servers that are being used by the QA team to test load handling
Note: This Question is unanswered, help us to find answer for this one
18. A company has decided to implement "cloud bursting" to allow their production environment to scale to any size by utilizing on-demand connections to a public cloud IaaS infrastructure. Which solution allows the IT department to minimize security risks by treating the IaaS environment as a logical extension of their internal network?
Answer
Correct Answer:
Virtual DLP connection between the datacenter and the IaaS provider
Note: This Question is unanswered, help us to find answer for this one
19. Which security requirement is difficult for a SaaS provider to meet?