Which of the following vulnerability management concepts is best defined as the process of discovering vulnerabilities?
Correct Answer:D
In vulnerability management, 'Identification' is the concept best defined as the process of discovering vulnerabilities. This step is crucial as it involves detecting vulnerabilities in systems, software, and networks, which is the first step in the vulnerability management process before moving on to assessment, remediation, and reporting.
A cloud architect is preparing environments to develop a new application that will process sensitive data. The project team consists of one internal developer, two external consultants, and three testers. Which of the following is the most important security control for the cloud architect to consider implementing?
Correct Answer:D
In a project handling sensitive data with a mix of internal and external team members, implementing Identity and Access Management (IAM) and Access Control Lists (ACL) is crucial for Data Loss Prevention (DLP). These controls ensure that only authorized individuals have access to specific resources, and actions are governed according to the principle of least privilege, minimizing the risk of data leakage or unauthorized access.
For compliance purposes, a cloud developer at an insurance company needs to save all customer policies for more than ten years. Which of the following options is the most cost-efficient tier to save the data in the cloud?
Correct Answer:A
For compliance purposes, saving customer policies for more than ten years most cost-efficiently can be achieved by using the Archive storage tier. Archive or archival storage is designed for data that needs to be retained over the long term but accessed infrequently. It is generally the most cost-effective storage tier for this type of data. References: CompTIA Cloud+ Study Guide (Exam CV0-004) by Todd Montgomery and Stephen Olson
HOTSPOT
A highly regulated business is required to work remotely, and the risk tolerance is very low. You are tasked with providing an identity solution to the company cloud that includes the following:
✑ secure connectivity that minimizes user login
✑ tracks user activity and monitors for anomalous activity
✑ requires secondary authentication
INSTRUCTIONS
Select controls and servers for the proper control points.
Solution:
Does this meet the goal?
Correct Answer:A
An administrator is creating a cron job that shuts down the virtual machines at night to save on costs. Which of the following is the best way to achieve this task?
A)
B)
C)
D)
Correct Answer:C
Option C is the correct script for shutting down virtual machines that are currently running. It iterates through a list of VMs, checks if the status of each VM is 'running', and if so, proceeds to shut down the VM. The script then prints a message stating that the VM has been stopped. This approach ensures that only VMs that are actively running are targeted for shutdown, optimizing resource utilization and cost savings.