Free CCCP-001 Exam Braindumps (page: 57)

Page 56 of 114

Which of the following would be used to prove the existence of vulnerabilities on a network?

  1. Penetration testing
  2. Vulnerability assessment
  3. Business impact analysis
  4. Risk assessment

Answer(s): A



Which of the following is MOST likely to be retrieved from an individually addressable blob?

  1. An object ID
  2. A hash
  3. A sequence number
  4. An image

Answer(s): D



Which of the following is true about a Type II hypervisor?

  1. It requires a primary hypervisor to function properly.
  2. It implements stronger security controls than a Type I supervisor at the same patch level.
  3. It provides slower performance than a Type I hypervisor installed on the same hardware.
  4. It provides direct hardware access through the use of specialized drivers.

Answer(s): C



A technician wants to configure a server for storage redundancy so that if any two of the four drives fail, the server is still operational.
Which of the following should the technician configure?

  1. RAID 0
  2. RAID 1
  3. RAID 5
  4. RAID 6

Answer(s): D






Post your Comments and Discuss GAQM CCCP-001 exam with other Community members:

CCCP-001 Exam Discussions & Posts