Free CCSP Exam Braindumps (page: 19)

Page 18 of 129

Which of the following security technologies is commonly used to give administrators access into trust zones within an environment?

  1. VPN
  2. WAF
  3. IPSec
  4. HTTPS

Answer(s): A

Explanation:

Virtual private networks (VPNs) are commonly used to allow access into trust zones. Via a VPN, access can be controlled and logged and only allowed through secure channels by authorized users. It also adds an additional layer of encryption and protection to communications.



Which concept BEST describes the capability for a cloud environment to automatically scale a system or application, based on its current resource demands?

  1. On-demand self-service
  2. Resource pooling
  3. Measured service
  4. Rapid elasticity

Answer(s): D

Explanation:

Rapid elasticity allows a cloud environment to automatically add or remove resources to or from a system or application based on its current demands. Whereas a traditional data center model would require standby hardware and substantial effort to add resources in response to load increases, a cloud environment can easily and rapidly expand to meet resources demands, so long as the application is properly implemented for it.



If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

  1. Kerberos support
  2. CHAP support
  3. Authentication
  4. Encryption

Answer(s): D

Explanation:

iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt communications.



Which of the following pertains to a macro level approach to data center design rather than the traditional tiered approach to data centers?

  1. IDCA
  2. NFPA
  3. BICSI
  4. Uptime Institute

Answer(s): A

Explanation:

The standards put out by the International Data Center Authority (IDCA) have established the Infinity Paradigm, which is intended to be a comprehensive data center design and operations framework. The Infinity Paradigm shifts away from many models that rely on tiered architecture for data centers, where each successive tier increases redundancy. Instead, it emphasizes data centers being approached at a macro level, without a specific and isolated focus on certain aspects to achieve tier status.






Post your Comments and Discuss ISC CCSP exam with other Community members:

CCSP Exam Discussions & Posts