E20-002 Cloud Infrastructure and Services Practice Exam Set 1

Which product provides a solution for Cloud user access management?


Options are :

  • EMC Ionix Unified Infrastructure Manager
  • EMC Ionix Cloud Manager
  • VMware vCloud Director
  • VMware Service Manager

Answer : VMware vCloud Director

E20-002 Cloud Infrastructure and Services Practice Exam Set 2

What statement related to a Virtual Demilitarized Zone (DMZ) is true?


Options are :

  • DMZ virtual machines should be in separate sub-networks.
  • Trusted nodes in the DMZ are not accessible from outside networks.
  • A virtual DMZ can support multiple trust zones.
  • Virtual DMZ subnets do not use a firewall to protect traffic.

Answer : A virtual DMZ can support multiple trust zones.

Which measure should an administrator adopt to mitigate multitenancy-based security concerns in a Cloud environment?


Options are :

  • Virtual firewall
  • Virtual machine reservation
  • Mutual client isolation
  • Sandboxing

Answer : Mutual client isolation

Consider the following actions: 1. Exhausting resources such as CPU cycles or network bandwidth 2. Exploiting weaknesses in communication protocols 3. Hijacking of user identities 4. Intercepting communications traffic Which of these actions are involved in a Denial of Service (DoS) attack?


Options are :

  • 2 and 3
  • 2 and 4
  • 1 and 2
  • 1 and 3

Answer : 1 and 2

E20-011 Storage Networking Design Management Practice Exam Set 3

From which level should a Distributed Denial of Service attack be prevented?


Options are :

  • Perimeter
  • Compute
  • Access control
  • Network

Answer : Network

Review the following considerations: 1. A contingency plan for handling data in the Cloud 2. A process for migrating the data back into the organization or to another Cloud 3. Whether or not data can be moved over the network in a reasonable amount of time 4. Cost of transferring ownership of the infrastructure back to the client Which considerations should apply before terminating a Cloud service agreement?


Options are :

  • 2, 3, and 4
  • 1 and 4
  • 2 and 4 only
  • 1, 2, and 3

Answer : 1, 2, and 3

Which product provides a solution for multi-factor authentication?


Options are :

  • RSA envision
  • RSA BSAFE
  • RSA Archer eGRC
  • RSA SecurID

Answer : RSA SecurID

E20-002 Cloud Infrastructure and Services Practice Exam Set 4

Which security measures should be adopted to prevent virtual machine (VM) theft?


Options are :

  • VM reservation
  • Sandboxing of the guest OS
  • Mutual client isolation
  • VM copy and move restrictions

Answer : VM copy and move restrictions

Which security aspect ensures that unauthorized changes to data are prevented?


Options are :

  • Authenticity
  • Integrity
  • Integrity
  • Availability

Answer : Integrity

Which measure should be adopted to mitigate the challenge of "velocity of attack" in the Cloud?


Options are :

  • Defense-in-depth
  • Virtual firewall
  • Client based security protection
  • Sandboxing

Answer : Defense-in-depth

E10-110 Enterprise Content Management Certify Practice Exam Set 6

Which product provides a solution for one-time password based authentication?


Options are :

  • RSA SecurID
  • RSA BSAFE
  • RSA Archer eGRC
  • RSA Envision

Answer : RSA SecurID

Which security process defines the scope of the access rights for a resource?


Options are :

  • Authentication
  • Authorization
  • Auditing
  • Encryption

Answer : Authorization

Which security mechanism(s) defines the boundary between security critical and noncritical parts of an information system?


Options are :

  • Trusted Computing Base
  • Defense-in-Depth
  • Authentication, Authorization, and Auditing
  • Encryption

Answer : Trusted Computing Base

E10-110 Enterprise Content Management Certify Practice Exam Set 1

Which operation is performed by user access management software?


Options are :

  • Monitor allocation and usage of resources associated with Cloud service instances
  • Manage bundling of application and platform software
  • Enable users to create virtual infrastructure from physical infrastructure
  • Manage multiple grade levels for each type of user resource pool

Answer : Monitor allocation and usage of resources associated with Cloud service instances

Which is a recommended method for virtual machine (VM) hardening?


Options are :

  • Use VM only for proprietary applications
  • Disable VM access to the management console
  • Use a directory service for authentication
  • Use a VM snapshot to provision a new VM

Answer : Use a directory service for authentication

How does the VMware vShield Endpoint product streamline and accelerate anti-virus and anti-malware deployment?


Options are :

  • The engines and signature files are only updated within the special security virtual machine.
  • All anti-virus and anti-malware mitigation is performed in a single place.
  • Running detection software against client disk partitions finds infections earlier
  • Engines and signature files can be deployed to a common share available to all clients

Answer : The engines and signature files are only updated within the special security virtual machine.

E10-110 Enterprise Content Management Certify Practice Exam Set 3

What is a major reason for auditing?


Options are :

  • To ensure that only authorized individuals can access the system
  • To evaluate the effectiveness of security enforcement controls and processes
  • To measure and charge for computer usage
  • To ensure that individuals are provided with privileges appropriate for their role

Answer : To evaluate the effectiveness of security enforcement controls and processes

Which security mechanism removes the need for services to provide their own identity system and allows users to consolidate their digital identities?


Options are :

  • OpenID
  • Shared LDAP directory
  • One-time passwords
  • Federated Identity Management

Answer : OpenID

A Cloud service provider decides to close its business due to legal litigation. Which Governance, Risk and Compliance (GRC) document would safeguard the interests of its clients?


Options are :

  • Termination Agreement
  • Service Implementation Guide
  • Service Level Agreement
  • Business Continuity Agreement

Answer : Termination Agreement

E10-110 Enterprise Content Management Certify Practice Exam Set 4

Which Governance, Risk and Compliance (GRC) aspect may limit adoption of public Clouds for applications handling sensitive data?


Options are :

  • Inadequate anti-virus protection
  • Lack of robust data encryption standards
  • SAN Security Regulations
  • Information Flow Regulations

Answer : Information Flow Regulations

What is a major reason for auditing?


Options are :

  • To ensure that only authorized individuals can access the system
  • To evaluate the effectiveness of security enforcement controls and processes
  • To ensure that individuals are provided with privileges appropriate for their role
  • To measure and charge for computer usage

Answer : To evaluate the effectiveness of security enforcement controls and processes

E20-011 Storage Networking Design Management Practice Exam Set 5

Which measure should be adopted to mitigate the challenge of "velocity of attack" in the Cloud?


Options are :

  • Sandboxing
  • Virtual firewall
  • Defense-in-depth
  • Client based security protection

Answer : Defense-in-depth

Which security mechanism(s) defines the boundary between security critical and noncritical parts of an information system?


Options are :

  • Defense-in-Depth
  • Trusted Computing Base
  • Authentication, Authorization, and Auditing
  • Encryption

Answer : Trusted Computing Base

Which is a recommended method for virtual machine (VM) hardening?


Options are :

  • Disable VM access to the management console
  • Use VM only for proprietary applications
  • Use a directory service for authentication
  • Use a VM snapshot to provision a new VM

Answer : Use a directory service for authentication

E10-110 Enterprise Content Management Certify Practice Exam Set 1

How does the VMware vShield Endpoint product streamline and accelerate anti-virus and anti-malware deployment?


Options are :

  • The engines and signature files are only updated within the special security virtual machine.
  • Running detection software against client disk partitions finds infections earlier
  • Engines and signature files can be deployed to a common share available to all clients
  • All anti-virus and anti-malware mitigation is performed in a single place.

Answer : The engines and signature files are only updated within the special security virtual machine.

Which operation is performed by user access management software?


Options are :

  • Manage bundling of application and platform software
  • Monitor allocation and usage of resources associated with Cloud service instances
  • Enable users to create virtual infrastructure from physical infrastructure
  • Manage multiple grade levels for each type of user resource pool

Answer : Monitor allocation and usage of resources associated with Cloud service instances

Which product provides a solution for multi-factor authentication?


Options are :

  • RSA BSAFE
  • RSA SecurID
  • RSA Archer eGRC
  • RSA envision

Answer : RSA SecurID

E20-002 Cloud Infrastructure and Services Practice Exam Set 4

Which measure should an administrator adopt to mitigate multitenancy-based security concerns in a Cloud environment?


Options are :

  • Sandboxing
  • Mutual client isolation
  • Virtual machine reservation
  • Virtual firewall

Answer : Mutual client isolation

Which security measures should be adopted to prevent virtual machine (VM) theft?


Options are :

  • Mutual client isolation
  • VM copy and move restrictions
  • VM reservation
  • Sandboxing of the guest OS

Answer : VM copy and move restrictions

Which product provides a solution for Cloud user access management?


Options are :

  • VMware Service Manager
  • EMC Ionix Cloud Manager
  • EMC Ionix Unified Infrastructure Manager
  • VMware vCloud Director

Answer : VMware vCloud Director

E20-011 Storage Networking Design Management Practice Exam Set 2

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions