Marcella has been hired to perform an audit of a security incident where a large corporation was using an open-source application that they had deployed to a cloud service provider. The application was used to manage the many people whose information it tracked and included a lot of identifying information about them that could be used in identity fraud. Unfortunately, the person that installed the application never removed the default administrative account that was still using the default password. Which of the following describes this scenario?
Michonne currently manages a private cloud that has been bui…
Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life, and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company?
Fictional Corp. has made the decision to outsource the creat…
Fictional Corp. has made the decision to outsource the creation of a cloud application that will be used by its sales department. Which method from the list below may the business utilize to request bids for the project?
Stan is walking past a row of cubicles when he notices someo…
Stan is walking past a row of cubicles when he notices someone’s password written down on a sticky note that is attached to a monitor. The password is passwordpassword3. Besides the obvious problem of the word password repeated followed by a single number, which of the following policies isn’t in place that should be?
Colm is designating the QoS level to the messages on his cor…
Colm is designating the QoS level to the messages on his corporation’s network and has determined a certain type of message should be delivered exactly once when it is sent. Which QoS level should he designate these messages?
In a cloud environment, which device might be arranged at th…
In a cloud environment, which device might be arranged at the presentation tier of a basic three-tier infrastructure?
Ingrid has configured one of the network segments to use a D…
Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?
Carol is analyzing the security on her company’s hybrid netw…
Carol is analyzing the security on her company’s hybrid network and sees that GRE is being used as a VPN. Why does Carol recommend it be removed from the company’s network?
Terrance is designing storage for a startup company and need…
Terrance is designing storage for a startup company and needs to ensure from the beginning that it will be able to handle high levels of variety in high volumes and arriving in high velocity. Which of the following technologies is he designing for?
Enid is implementing new systems on a cloud service provider…
Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement?