850-001 Dumps 850-001 Braindumps 850-001 Real Questions 850-001 Practice Test 850-001 Actual Questions Symantec 850-001 Cloud Security 1.0 https://killexams.com/pass4sure/exam-detail/850-001 Question: 90 Which action addresses a risk inherent to the public cloud model? A. harden applications sufficiently for multi-tenant environments B. revert a public cloud to a private cloud during an emergency C. apply anti-spam measures on the endpoint accessing the cloud D. activate deduplication on the cloud-based storage Answer: A Question: 91 In order to achieve greater scalability, a CIO has mandated that a specific set of processes and data move to a cloud environment. These assets include: – Company email requiring anti-spam protection – Proprietary database with specific infrastructure requirements – Point-of-sale application and process for retail purchases. Which service and deployment model could support all of these assets? A. Infrastructure as a Service, hosted in a private cloud B. Platform as a Service, hosted in a public cloud C. Software as a Service, hosted in a private cloud D. Software as a Service, hosted in a public cloud Answer: A Question: 92 A company is moving to the cloud. Because of DDOS attacks, it would like to start by moving email to the cloud. The company is small, with fewer than 200 users. What is the most cost- effective deployment model for this company to begin using? A. IaaS community B. IaaS public C. PaaS hybrid D. SaaS public Answer: C Question: 93 Several government agencies collaborate extensively, sharing a variety of tools, processes, and data. Data shared by the organizations is highly sensitive, and risk tolerance for data loss or exposure is extremely low. Which type of cloud solution is appropriate in this scenario? A. internally-hosted infrastructure providing a community cloud B. internally-hosted infrastructure providing a private cloud C. externally-hosted infrastructure providing a community cloud D. externally-hosted infrastructure providing a private cloud Answer: A Question: 94 A large enterprise that is currently supported by a very large IT infrastructure and experienced staff would like to offer individual Business Units (BUs) the ability to use local servers and storage on an as-needed basis. The BUs would then be charged accordingly, based on their individual usage. Which cloud service and deployment model combination provides an appropriate solution? A. Platform as a Service, public cloud B. Platform as a Service, private cloud C. Infrastructure as a Service, public cloud D. Infrastructure as a Service, private cloud Answer: D Question: 95 A current customer’s cloud service provider is undergoing a merger and acquisition process. This increases the likelihood of a strategic shift to the customer’s business operations and may put non-binding agreements at risk, as well as make compliance with security requirements impossible. How is this cloud provider acquisition risk categorized? A. policy and organizational B. technical C. lock-in D. non-cloud specific Answer: A Question: 96 A cloud service provider administrator has discovered that someone is attempting to determine which servers and operating systems are running on a tenant’s network by using network mapping. How is this risk categorized? A. policy and organizational B. technical C. legal D. non-cloud specific Answer: B Question: 97 A cloud customer has determined that their data is being held in multiple geographic locations. They are concerned that these sites will be raided by local authorities and their data or systems are subject to disclosure or seizure. Which risk category does this type of risk fall into? A. policy and organizational B. technical C. legal D. non-cloud specific Answer: C Question: 98 An IT security professional at a large US-based manufacturing company has decided to deploy and manage a host intrusion detection solution to assist with their migration to a cloud environment. Which cloud environment will benefit from this solution? A. multi-tenant SaaS B. hybrid SaaS C. multi-tenant IaaS D. multi-tenant PaaS Answer: C Question: 99 Which action addresses a risk inherent to the public cloud model? A. harden applications sufficiently for multi-tenant environments B. revert a public cloud to a private cloud during an emergency C. apply anti-spam measures on the endpoint accessing the cloud D. activate deduplication on the cloud-based storage Answer: A Question: 100 A company has decided to implement "cloud bursting" to allow their production environment to scale to any size by utilizing on-demand connections to a public cloud IaaS infrastructure. Which solution allows the IT department to protect against VM hopping? A. data loss prevention B. anti-virus / anti-spam C. data and mail encryption D. host intrusion prevention Answer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