Friday, June 28, 2013

E10-001 Question 185

E10-001 Question 185
What is an example of an availability management task?



A. Configuring LUN masking
B. Enforcing capacity quotas for users
C. Installing multipathing software
D. Auditing of event logs

Answer: C

E10-001 Question 180

E10-001 Question 180
What is recommended for a SAN security architecture?

A. Single hierarchical solution for security
B. Multiple integrated layers of security
C. Multiple isolated solutions for security
D. Multiple isolated layers of security
 

Answer: B

E10-001 Question 179

E10-001 Question 179
What is an example of corrective control?

A. Deploying role-based access control to manage permissions
B. Running an antivirus program after denial of service
C. Setting up user accounts and passwords to control unauthorized access
D. Encrypting the data in-flight and data-at-rest
 

Answer: B

E10-001 Question 178

E10-001 Question 178
How can an organization reduce vulnerabilities in their environment?

A. Minimize the attack surface and maximize the work factor
B. Maximize the attack surface and minimize the work factor
C. Minimize both the attack surface and work factor
D. Maximize both the attack surface and work factor
 

Answer: A

E10-001 Question 177

E10-001 Question 177
What are the three primary goals of information security?

A. Authenticity, repudiation, and accountability
B. Availability, confidentiality, and integrity
C. Authenticity, confidentiality, and accountability
D. Availability, authenticity, and confidentiality
 

Answer: B

E10-001 Question 176

E10-001 Question 176
What is a challenge to consumers in adopting a public cloud?

A. High CAPEX
B. Delayed resource scaling
C. Management overhead
D. Vendor lock-in
 

Answer: D

E10-001 Question 175

E10-001 Question 175
A careful analysis of financial benefits provides a clear picture about the cost savings in cloud adoption. Which two factors should the analysis compare?

A. ROI and CAPEX
B. CAPEX and OPEX
C. TCO and SLA
D. TCO and ROI
 

Answer: D