Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

Similar documents
Network Security Policy

Sample question paper. Duration: 75 minutes. Candidate s name: Candidate s enrolment number: Centre name: Centre number: Date:

ISSP Network Security Plan

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Benefits of Cloud Computing

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

SECURITY & PRIVACY DOCUMENTATION

AppPulse Point of Presence (POP)

Information Services IT Security Policies L. Network Management

IT your way - Hybrid IT FAQs

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Information Security Policy

enalyzer enalyzer security

CHAPTER 5 DISCUSSION AND ANALYSIS

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Data Protection in Practice

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

Data Security at Smart Assessor

Projectplace: A Secure Project Collaboration Solution

Physical and Environmental Security Standards

emarketeer Information Security Policy

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

OUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE

BME CLEARING s Business Continuity Policy

A Ready Business rises above infrastructure limitations. Vodacom Power to you

April Appendix 3. IA System Security. Sida 1 (8)

Data Centers & Technology:

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Hosted Testing and Grading

The Common Controls Framework BY ADOBE

IT CONTINUITY, BACKUP AND RECOVERY POLICY

DATA CENTRE & COLOCATION

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Applications/Data To Include in Survey (include applications that meet one or more of the following criteria)

CLOUD COMPUTING READINESS CHECKLIST

THE PATH TO LOWEST TOTAL COST OF OWNERSHIP WITH INDUSTRIAL AUTOMATION OPERATIONAL SYSTEMS. Avoiding Downtime with a Positive ROI

Network Performance, Security and Reliability Assessment

DaaS. Contents. Overview. Overview Features DaaS Clients What is DaaS FAQ s Migration Services. Benefits. 1 P a g e

ISO27001 Preparing your business with Snare

Backup and Restore Strategies

7.16 INFORMATION TECHNOLOGY SECURITY

NEN The Education Network

IT Security Standard Operating Procedure

Dude Solutions Business Continuity Overview

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

San Francisco Chapter. What an auditor needs to know

Institute of Technology, Sligo. Information Security Policy. Version 0.2

What can the OnBase Cloud do for you? lbmctech.com

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

Cloud FastPath: Highly Secure Data Transfer

Google Cloud & the General Data Protection Regulation (GDPR)

Cloud First Policy General Directorate of Governance and Operations Version April 2017

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

AUTHORITY FOR ELECTRICITY REGULATION

Evolved Backup and Recovery for the Enterprise

arcserve r16.5 Hybrid data protection

Information Security Management Criteria for Our Business Partners

SECURITY DOCUMENT. 550archi

MyCloud Computing Business computing in the cloud, ready to go in minutes

NetBackup as a Service

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

BUSINESS CONTINUITY. Topics covered in this checklist include: General Planning

CANVAS DISASTER RECOVERY PLAN AND PROCEDURES

Infrastructure Security Overview

MEETING ISO STANDARDS

Cloud Service SLA Declaration

BCS Level 3 Award in Cloud Services Syllabus

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

Exam Questions N10-006

Qualification Specification for the Knowledge Modules that form part of the BCS Level 3 Infrastructure Technician Apprenticeship

IBM Case Manager on Cloud

The simplified guide to. HIPAA compliance

Introducing VMware Validated Designs for Software-Defined Data Center

Distributed Systems. 31. The Cloud: Infrastructure as a Service Paul Krzyzanowski. Rutgers University. Fall 2013

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Realiable and extensive solutions for your business #EmpoweringYourFuture

It's hosting, safe and secure.

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

Kroll Ontrack VMware Forum. Survey and Report

Expert Reference Series of White Papers. Understanding Data Centers and Cloud Computing

Introducing VMware Validated Designs for Software-Defined Data Center

Online Services Security v2.1

What is cloud computing? The enterprise is liable as data controller. Various forms of cloud computing. Data controller

SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2

Information Technology General Control Review

Information Security Policy

Managed Services Rely on us to manage your business services

CHEM-E Process Automation and Information Systems: Applications

COLOCATION 1/4 RACK RACK COLD AISLE CONTAINEMENT PRIVATE CAGE PRIVATE SUITE FLEXIBLE PRICING OPTIONS

Security Standards for Electric Market Participants

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

YOUR CONDUIT TO THE CLOUD

IT risks and controls

EXHIBIT A. - HIPAA Security Assessment Template -

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup

Transcription:

9628-08 Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) 9628-808 Cloud Services Sample question paper Duration: 60 minutes Candidate s name: Candidate s enrolment number: Centre name: Centre number: Date:

1 Which one of the following describes the ability of cloud services to scale the capacity offered to a client? a. Elasticity. b. Plasticity. c. Ubiquity. d. Serviceability. 2 What does the term 'ubiquitous access' mean when applied to cloud services? a. The service can be accessed from anywhere and from any device. b. The service is provided on a fixed annual contract basis. c. The service is un-interruptible under normal conditions. d. The service can only be accessed using the same device. 3 Which one of the following best describes the situation in which a single instance of software runs on a server and serves more than one consumer? a. Single tenancy. b. Multi-tenancy. c. Pay as you grow. d. Single occupancy. 4 Which characteristic of cloud technology might be particularly beneficial to a new business that needs to be operational very quickly? a. Rapid deployment of services. b. Minimum investment in hardware. c. Potential for automation. d. Ability to be widely accessible. 5 Which one of the following best describes the term 'hybrid cloud'? a. When high speed processing is required in house. b. When a mix of private, public and community cloud models are used. c. When the latest developments in cloud model storage are deployed. d. When a business wants to use only its own dedicated cloud model. 6 Which term best describes the hosting model where the customer is only responsible for the applications it is developing? a. SaaS. b. XaaS. c. IaaS. d. PasS. 7 Which law may be broken if a cloud hosting provider choses to host personal data in a non-eu country? a. Computer misuse law. b. Human rights law. c. Official secrets law. d. Data protection law. 8 Which one of the following is a violation of the Computer Misuse Act (1990)? a. Authorised user logs on to a remote computer. b. Data stored in a non EU country. c. Unauthorised access to a client's laptop. d. Client data transferred to a new host. 9 Why is having a large amount of RAM an important requirement for a cloud server? a. It is required by modern networks. b. It enables the server to be administered remotely. c. It allows multiple instances of services to be run. d. It prevents unnecessary system shutdowns. 10 Which of the following statements is correct about 'Load Balancing'? a. It can reduce the load on the router. b. It can distribute the load between servers. c. It can increase security. d. It can increase power overload.

11 What is the best way to maintain the right working temperature for hardware in a data centre? a. Provide adequate air-conditioning units. b. Locate the site in a temperate climate. c. Allow plenty of natural ventilation. d. Ensure thermometers are installed. 12 What is Mean Time Between Fails (MTBF)? a. It is a measure of how reliable a component is. b. It is a count of how many times a component has developed a fault. c. It is a way of counting storage space. d. It is a measure of return on investment. 13 What is meant by the term 'redundancy' when referring to cloud hosting? a. The number of technical staff to be laid off. b. The quality of the failsafe mechanism employed. c. The provision of more than one critical component. d. The withdrawal of unwanted assets. 14 Which one of the following statements is correct about a DHCP server? a. It only works on a LAN. b. It allocates the IP address of the device. c. It fails to work on a smartphone. d. It decreases risk of a security breach. 15 Which one of the following is typically used as a measure of Quality of Service in Cloud Services? a. Delay in traffic. b. Scalability. c. Ease of use. d. Security. 16 Which one of the following combinations is most likely to give the best user experience when connecting to cloud services? 17 Which one of the following is a key technical consideration in choosing a tablet to be used by field staff to access a cloud based web service? a. The manufacturer's warranty. b. The storage capacity. c. The provision of USB ports. d. The size and weight of the device. 18 Which one of the following is the most important consideration when delivering a cloud based database application? a. The design of the command line Interface. b. The latency of the system. c. The location of the web interface. d. The back-up software manufacturer. 19 What must be checked before setting up a Virtual Machine (VM) on a Windows workstation? a. The BIOS is the latest version. b. The BIOS is password protected. c. Appropriate support is enabled in the BIOS. d. Ports are configured correctly in BIOS. 20 Which one of the following is the most important to include when drawing up a Service Level Agreement (SLA) with a service provider? a. The list of available workstations. b. The benefits of the service. c. The password for the portal. d. The expected availability and reliability. 21 Which DNS record would have to be configured for a cloud based email service? a. CNAME record. b. MX record. c. AAAA record. d. PTR record. a. Smartphone connected via 4G. b. Laptop connected via Ethernet. c. Tablet connected via WiFi. d. Desktop connected via WiFi dongle.

22 Why is it important for the user to have the ability to customise the User Interface (UI) on a cloud service? a. It ensures higher security as strict passwords are enforced. b. It can provide appropriate user accessibility options. c. It allows more consistent monitoring of users. d. It will allow a faster response time for any faults raised. 23 What is an essential requirement for a provider offering multi-tenancy in a cloud based service? a. Data is segregated between different clients. b. Clients enabled to raise requests. c. User interface is customisable. d. Traffic is monitored. 24 Which one of the following statements is correct about Device ID when accessing cloud services? a. It is the same as a MAC address. b. It is initially set by the manufacturer. c. It is initially set by the user. d. It is the same as the IPv6 address. 25 What makes self-service portals attractive to the cloud service provider? a. They allow consumers to configure the latency. b. They are complicated to configure. c. They reduce the cost of service provision. d. They are complex for the customer to use. 26 What is the benefit to a business if a Disaster Recovery Plan is compliant with ISO standards? a. It is enforced by government departments. b. It always reduces the cost of recovery from a disaster. c. It demonstrates the procedures are internationally accepted best practice. d. It means that testing of the procedures is never required. 27 Which one of the following best describes the application of 'the principle of least privilege'? a. All employees are given super user rights. b. All managers have admin rights to access all information. c. Employees only have the access necessary to perform their job role. d. Established employees are given increased access to the system. 28 When conducting a risk assessment, which one of the following poses the highest risk of fire starting in a server room? a. Presence of a kitchen in the same block. b. Lack of fire extinguishers near the room. c. Location of server room in basement. d. Overloaded power supply in the room. 29 Which of the following is an example of risk avoidance, following a risk analysis of a server room located in a basement and prone to seasonal flooding? a. The server room was relocated on an upper floor. b. The main server rack was placed behind waterproof doors. c. The users were notified of risk to service during wet season. d. Contingency plan was drawn up to relocate if flooding was imminent. 30 Which one of the following is a viable contingency plan for coping with internet loss due to connectivity failure? a. An alternative ISP network. b. A faster connection. c. An increase in local storage. d. A WiFi connection.

31 Which one of the following is a viable contingency plan for coping with loss of a hard disk on a real time Network Attached Storage (NAS)? a. Having a server that can be brought online on short notice. b. Creating a hot swappable RAID configuration. c. Informing users to work locally until the server is restored. d. Informing users that services will not be available for that day. 32 Which statement best describes one of the responsibilities of an IT Manager in ensuring that disaster recovery goes according to plan? a. To maintain an accurate and up to date asset register of all hardware. b. To keep a list of local first aiders on the same floor as the server room. c. To ensure that adequate budget has been set aside for IT upgrades. d. To ensure that the emergency alarms in the server room are working. 33 What is a suitable 'prevent' step for a call centre business with a high turnover of staff? a. Single point of authentication. b. Password change every 30 days. c. Two step authentication. d. Username change every week. 34 What is a suitable 'detect' mechanism for a data centre with minimal staff? a. Issuing of ID cards. b. Irregular security patrols. c. Actively monitored CCTV. d. Steel reinforced doors 35 What is a suitable 'respond' step for a small business when a virus has been detected on a desktop? a. Inform the business owner. b. Analyse and assess the risk. c. Carry out a full back up. d. Remove all devices from the network. 36 Which one of the following is the most appropriate 'respond' action when an online business's customer contact details have been compromised? a. Publicise widely across all social media. b. Inform the local police. c. Inform the named person in the action plan. d. Email all members of staff. 37 What is the most appropriate 'recovery' step for a software house when the latest release has been accidently deleted? a. Conduct a restore from the original backup. b. Replace a disk in RAID array. c. Conduct a restore from the latest tested backup. d. Run a full malware scan. 38 Which one of the following is the best explanation of a Recovery Point Objective (RPO) when applied to a service that relies on regular access to a database system? a. It s the maximum period of time that the business can afford for database downtime. b. It s the stage at which the recovery and the database are checked for integrity. c. It s the target time set to recover the database in full after the incident. d. It s the plan to be activated when the database has been fully recovered. 39 What is the next 'restore' step for a software house to take when deleted data has been restored and verified? a. Report the data loss to the authorities. b. Inform the Chairman of the Board. c. Review the cause of the incident plan. d. Change the key personnel.

40 Which one of the following is the most appropriate 'restore' step for a large business where the internal network has been restored following a crash? a. Reset all access points in the business. b. Reconfigure all VLANs. c. Validate all network infrastructure. d. Replace all switches in the network. NOW GO BACK AND CHECK YOUR WORK IMPORTANT - Are the details at the top of the answer sheet correct?