Microsoft - Analyzing Data with Microsoft Power BI - DA-100 exam dumps
You have the tables show in the following exhibit:
More than 10 million Sales records are generated every month.
You want to create an analytics system displays the number of sales per day, per product, and per sales person. You also want to ensure that the data model is as small as possible. You create the following many to one relationships:
Sales to Product Sales to Salesperson What should you do next?
A. For each relationship, change the Cross filter direction to Both.
B. Group the sales by Order_Date, Product_id, and Salesperson_id. Then aggregate by using the CountRows function.
C. Create a new group on the Sales_Amount column and set the Group type to Bin.
D. Create a new hierarchy that summarizes the data by the Sales_Amount column.Access to the full exam of DA-100 with correct answers
ABA - Certified Trust and Fiduciary Advisor - CTFA exam dumps
Which of the following bonds give the issuer the right to repay the debt prior to maturity?
A. Municipal bonds
B. Callable bonds
C. Convertible bonds
D. Zero coupon bondsAccess to the full exam of CTFA with correct answers
ACAMS - CAMS — Certified Anti-Money Laundering Specialis - CAMS exam dumps
How do drug traffickers and other criminals use the fine art industry to disguise illicit proceeds?
A. They use forged or fraudulent invoicing of priceless works of art by auction houses
B. They commingle legitimate and illicit proceeds by principals for payment of fine art
C. They immediately resell priceless works of art after purchase from a foreign auction house
D. They use anonymous agents to buy the art and have the payment wired from offshore havens
Access to the full exam of CAMS with correct answers
ACFE - Certified Fraud Examiners - CFE exam dumps
A typical issue involving material and fraud would be:
A. Fraudulent statement
C. Civil lawsuit
D. Quality controlAccess to the full exam of CFE with correct answers
Adobe - Adobe Certified Expert - Adobe Experience Manager Forms Developer - 9A0-410 exam dumps
Which three main properties are required to create a remote function?
A. connectors.xmlinvoker, connectors.xmlinvoker.alias, exm.service
B. connectors.jsoninvoker, connectors.jsoninvoker.alias, exm.service
C. connectors.jsoninvoker, connectors.jsoninvoker.alias, exm.impl
D. connectors.xmlinvoker, connectors.xmlinvoker.alias, exm.implAccess to the full exam of 9A0-410 with correct answers
AHIMA - Registered Health Information Administrator - RHIA exam dumps
An effective means of protecting the security of computerized health information would be to
A. require all facility employees to change their passwords at least once a month.
B. write detailed procedures for the entry of data into the computerized information system.
C. install a system that would require fingerprint scanning and recognition for data access.
D. develop clear policies on data security that are supported by the top management of the facility.Access to the full exam of RHIA with correct answers
AICPA - Certified Public Accountant (CPA) - CPA exam dumps
What happens when you attempt to compile and run the following code?
using namespace std;
int op(int x, int y);
cout << op(1, *pf);
int op(int x, int y)
A. It prints: 0
B. It prints: 0.5
C. It prints: 1
D. It prints: ?1
Access to the full exam of CPA with correct answers
Alfresco - Alfresco Process Services Certified Administrator (APSCA) - APSCA exam dumps
Which of the following technologies can be used for clustering a multi-node instance of Alfresco Process Services? (Choose two.)
A. VM Clustering.
B. Load Balancer.
D. JLAN Clustering.
E. Ehcache.Access to the full exam of APSCA with correct answers
Amazon - AWS Certified Advanced Networking - Specialty - ANS-C00 exam dumps
You are configuring a VPN to AWS for your company. You have configured the VGW and CGW. You have created the VPN. You have also run the necessary commands on your router. You allowed all TCP and UDP traffic between your datacenter and your VPC. The tunnel still doesn't come up. What is the most likely reason?
A. You forgot to turn on route propagation in the route table.
B. You do not have a public ASN.
C. Your advertised subnet is too large.
D. You haven't added protocol 50 to your firewall.Access to the full exam of ANS-C00 with correct answers
Amazon - AWS Certified Cloud Practitioner - CLF-C01 exam dumps
A cloud practitioner needs to obtain AWS compliance reports before migrating an environment to the AWS Cloud.
How can these reports be generated?
A. Contact the AWS Compliance team
B. Download the reports from AWS Artifact
C. Open a case with AWS Support
D. Generate the reports with Amazon MacieAccess to the full exam of CLF-C01 with correct answers
Amazon - AWS Certified Data Analytics - Specialty - DAS-C01 exam dumps
A data analytics specialist is building an automated ETL ingestion pipeline using AWS Glue to ingest compressed files that have been uploaded to an Amazon S3 bucket. The ingestion pipeline should support incremental data processing.
Which AWS Glue feature should the data analytics specialist use to meet this requirement?
C. Job bookmarks
D. ClassifiersAccess to the full exam of DAS-C01 with correct answers
Amazon - AWS Certified Database - Specialty - DBS-C01 exam dumps
A company is running a website on Amazon EC2 instances deployed in multiple Availability Zones (AZs). The site performs a high number of repetitive reads and writes each second on an Amazon RDS for MySQL Multi-AZ DB instance with General Purpose SSD (gp2) storage. After comprehensive testing and analysis, a database specialist discovers that there is high read latency and high CPU utilization on the DB instance.
Which approach should the database specialist to take to resolve this issue without changing the application?
A. Implementing sharding to distribute the load to multiple RDS for MySQL databases.
B. Use the same RDS for MySQL instance class with Provisioned IOPS (PIOPS) storage.
C. Add an RDS for MySQL read replica.
D. Modify the RDS for MySQL database class to a bigger size and implement Provisioned IOPS (PIOPS).Access to the full exam of DBS-C01 with correct answers
Amazon - AWS Certified Developer - Associate - DVA-C01 exam dumps
A developer must modify an Alexa skill backed by an AWS Lambda function to access an Amazon DynamoDB table in a second account. A role in the second account has been created with permissions to access the table.
How should the table be accessed?
A. Modify the Lambda function execution role’s permissions to include the new role.
B. Change the Lambda function execution role to be the new role.
C. Assume the new role in the Lambda function when accessing the table.
D. Store the access key and the secret key for the new role and use then when accessing the table.Access to the full exam of DVA-C01 with correct answers
Amazon - AWS Certified DevOps Engineer - Professional - DOP-C01 exam dumps
If designing a single playbook to run across multiple Linux distributions that have distribution specific commands, what would be the best method to allow a successful run?
A. Enable fact gathering and use the `when' conditional to match the distribution to the task.
B. This is not possible, a separate playbook for each target Linux distribution is required.
C. Use `ignore_errors: true' in the tasks.
D. Use the `shell' module to write your own checks for each command that is ran.Access to the full exam of DOP-C01 with correct answers
Amazon - AWS Certified Machine Learning – Specialty - MLS-C01 exam dumps
A retail company is using Amazon Personalize to provide personalized product recommendations for its customers during a marketing campaign. The company sees a significant increase in sales of recommended items to existing customers immediately after deploying a new solution version, but these sales decrease a short time after deployment. Only historical data from before the marketing campaign is available for training.
How should a data scientist adjust the solution?
A. Use the event tracker in Amazon Personalize to include real-time user interactions.
B. Add user metadata and use the HRNN-Metadata recipe in Amazon Personalize.
C. Implement a new solution using the built-in factorization machines (FM) algorithm in Amazon SageMaker.
D. Add event type and event value fields to the interactions dataset in Amazon Personalize.Access to the full exam of MLS-C01 with correct answers
Amazon - AWS Certified Security - Specialty - SCS-C01 exam dumps
A company is developing an ecommerce application. The application uses Amazon EC2 instances and an Amazon RDS MySQL database. For compliance reasons, data must be secured in transit and at rest. The company needs a solution that minimizes operational overhead and minimizes cost.
Which solution meets these requirements?
A. Use TLS certificates from AWS Certificate Manager (ACM) with an Application Load Balancer. Deploy self-signed certificates on the EC2 instances. Ensure that the database client software uses a TLS connection to Amazon RDS. Enable encryption of the RDS DB instance. Enable encryption on the Amazon Elastic Block Store (Amazon EBS) volumes that support the EC2 instances.
B. Use TLS certificates from a third-party vendor with an Application Load Balancer. Install the same certificates on the EC2 instances. Ensure that the database client software uses a TLS connection to Amazon RDS. Use AWS Secrets Manager for client-side encryption of application data.
C. Use AWS CloudHSM to generate TLS certificates for the EC2 instances. Install the TLS certificates on the EC2 instances. Ensure that the database client software uses a TLS connection to Amazon RDS. Use the encryption keys form CloudHSM for client-side encryption of application data.
D. Use Amazon CloudFront with AWS WAF. Send HTTP connections to the origin EC2 instances.
Ensure that the database client software uses a TLS connection to Amazon RDS. Use AWS Key Management Service (AWS KMS) for client-side encryption of application data before the data is stored in the RDS database.Access to the full exam of SCS-C01 with correct answers
Amazon - AWS Certified Solutions Architect – Associate - SAA-C02 exam dumps
A company's application hosted on Amazon EC2 instances needs to access an Amazon S3 bucket. Due to data sensitivity, traffic cannot traverse the internet How should a solutions architect configure access?
A. Create a private hosted zone using Amazon Route 53.
B. Configure a VPC gateway endpoint for Amazon S3 in the VPC.
C. Configure AWS PrivateLink between the EC2 instance and the S3 bucket.
D. Set up a site-to-site VPN connection between the VPC and the S3 bucket.Access to the full exam of SAA-C02 with correct answers
Amazon - AWS Certified Solutions Architect - Professional - SAP-C01 exam dumps
A company is running a legacy application on Amazon EC2 instances in multiple Availability Zones behind a software load balancer that runs on an active/standby set of EC2 instances. For disaster recovery, the company has created a warm standby version of the application environment that is deployed in another AWS Region. The domain for the application uses a hosted zone from Amazon Route 53.
The company needs the application to use static IP addresses, even in the case of a failover event to the secondary Region. The company also requires the client’s source IP address to be available for auditing purposes.
Which solution meets these requirements with the LEAST amount of operational overhead?
A. Replace the software load balancer with an AWS Application Load Balancer. Create an AWS Global Accelerator accelerator. Add an endpoint group for each Region. Configure Route 53 health checks. Add an alias record that points to the accelerator.
B. Replace the software load balancer with an AWS Network Load Balancer. Create an AWS Global Accelerator accelerator. Add an endpoint group for each Region. Configure Route 53 health checks. Add a CNAME record that points to the DNS name of the accelerator.
C. Replace the software load balancer with an AWS Application Load Balancer. Use AWS Global Accelerator to create two separate accelerators. Add an endpoint group for each Region. Configure Route 53 health checks. Add a record set that is configured for active-passive DNS failover. Point the record set to the DNS names of the two accelerators.
D. Replace the software load balancer with an AWS Network Load Balancer. Use AWS Global Accelerator to create two separate accelerators. Add an endpoint group for each Region. Configure Route 53 health checks. Add a record set that is configured for weighted round-robin DNS failover. Point the record set to the DNS names of the two accelerators.Access to the full exam of SAP-C01 with correct answers
Amazon - AWS Certified SysOps Administrator - Associate - SOA-C01 exam dumps
A company is running a website on Amazon EC2 instances behind an Application Load Balancer (ALB). The company configured an Amazon CloudFront distribution and set the ALB as the origin. The company created an Amazon Route 53 CNAME record to send all traffic through the CloudFront distribution. As an unintended side effect, mobile users are now being served the desktop version of the website.
Which action should a SysOps administrator take to resolve this issue?
A. Configure the CloudFront distribution behavior to forward the User-Agent header.
B. Configure the CloudFront distribution origin settings. Add a User-Agent header to the list of origin custom headers.
C. Enable IPv6 on the ALB. Update the CloudFront distribution origin settings to use the dualstack endpoint.
D. Enable IPv6 on the CloudFront distribution. Update the Route 53 record to use the dualstack endpoint.Access to the full exam of SOA-C01 with correct answers
APICS - Certified Supply Chain Professional - CSCP exam dumps
- (Topic 3) Which of the following statements describes a continuous replenishment strategy in a retail environment?
A. Retailers make replenishment decisions.
B. Retailers prepare individual orders and share sales data with vendors to improve customer service.
C. Vendors use sales data and prepare shipments to maintain the desired level of inventory.
D. Vendors take full control of inventory policy.Access to the full exam of CSCP with correct answers
Apple - Apple Certified Mac Technician (ACMT) Mac OS X v10.6 Troubleshooting Exam - 9L0-062 exam dumps
Apple recommends the ________ volume format when setting up a Mac's hard drive for normal use.
A. Unix File System
B. Mac OS Extended
C. New Technology File System
D. Mac OS Extended (Journaled)
Access to the full exam of 9L0-062 with correct answers
Apple - Apple Certified Mac Technician (ACMT) Mac Service Certification Exam - 9L0-008 exam dumps
A Mac Pro fails to start up, and the status light on the front of the computer flashes three times. What does this indicate?
A. Thermal failure
B. No startup disk found
C. Firmware v3.0 upgrade required
D. A RAM bank failed memory testing
Access to the full exam of 9L0-008 with correct answers
ASQ - Quality Auditor Certification - CQA exam dumps
Who is responsible for preparing the corrective action plan?
A. The auditor
B. The auditee
C. The registrar
D. The audit manager
Access to the full exam of CQA with correct answers
ASQ - Quality Engineer Certification - CQE exam dumps
What is the probability of an item failing in less than 5 hours if it has a constant failure rate of 1/hour?
Access to the full exam of CQE with correct answers
Atlassian - Jira Project Administrator - ACP-600 exam dumps
A user approaches you with a problem.
She cannot see or edit the Priority system field on any of the screens of a Process Management project.
What explains the problem?
A. The field does not have the correct configuration context.
B. She is not listed in the priority scheme.
C. The field is hidden in the field configuration.
D. The field is not available for this project template.
E. She does not have the correct permission.Access to the full exam of ACP-600 with correct answers
BACB - BOARD CERTIFIED ASSISTANT BEHAVIOR ANALYST - BCaBA exam dumps
Adherence to "procedural integrity" promotes generalization by facilitatinG.
B. ethical treatment of consumer
C. consistency of instructio
D. spontaneous changes in intervention procedureAccess to the full exam of BCaBA with correct answers
BACB - The Board Certified Behavior Analyst - BCBA exam dumps
Mr. Winston has developed a reward system in his classroom where only those students who have submitted homework for 5 out of 5 days in the week receive a reward from the "treasure box." This is an example of a (n):
A. co-dependent group contingency.
B. dependent group contingency.
C. independent group contingency.
D. interdependent group contingency.Access to the full exam of BCBA with correct answers
BICSI - Registered Communications Distribution Designer - RCDD exam dumps
- (Topic 17) Geographically speaking, a ______ covers an area associated with an individual's work space.
C. LAND. CAN
E. WANAccess to the full exam of RCDD with correct answers
Blackberry - BlackBerry Enterprise Test Environement - BCP-221 exam dumps
A BlackBerry device user on the BlackBerry Enterprise Server does not have a Send option when trying to compose or reply to email messages. Which two of the following steps can be taken to troubleshoot the issue? (Choose two.)
A. Perform a hard reset on the BlackBerry device and see if the issue persists
B. Uninstall and reinstall the messaging application
C. Delete all email messages and resend
D. Delete and resend the Desktop [CMIME] service book
E. Delete and resend Desktop [CICAL]
Access to the full exam of BCP-221 with correct answers
Blueprism - Certified blueprism Professional Developer - APD01 exam dumps
When using Surface Automation which of the following statements about pressing a button is true?
A. It is possible to press a button which is identified as a Region using the "Global Mouse Click Centre” action of a Navigate Stage
B. You must use keystrokes to tab to the button before pressing it.
C. You can press the button by using the native "Press” action in a Navigate stage
D. You can only press a button by sending the button’s associated shortcut keystrokes.Access to the full exam of APD01 with correct answers
CA Technologies - Administration of Symantec Endpoint Protection 14 - 250-428 exam dumps
An organization identified a threat in their environment and needs to limit the spread of the threat.
How should the SEP Administrator block the threat using Application and Device Control?
A. Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on specific arguments
B. Gather the MD5 hash of the file and create an Application Content Rule that blocks the file based on the file fingerprint
C. Gather the MD5 hash of the file and create an Application Content Rule that uses regular expression matching
D. Gather the process name of the file and create an Application Content Rule that blocks the file based on the device id typeAccess to the full exam of 250-428 with correct answers
CertNexus - Cybersec First Responder - CFR-310 exam dumps
A security analyst has discovered that an application has failed to run. Which of the following is the tool MOST likely used by the analyst for the initial discovery?
C. Event Viewer
D. Process MonitorAccess to the full exam of CFR-310 with correct answers
Cisco - Cisco Certified CyberOps Associate - 200-201 CBROPS exam dumps
Which of the following represents the software that is acting on behalf of a user?
A. representative agent field
C. type field
D. host field
E. user agentAccess to the full exam of 200-201 CBROPS with correct answers
Cisco - Cisco Certified Network Associate - 200-301 CCNA itnv7 exam dumps
What is the term used for the Ethernet communication mechanism by which hosts can send and receive data simultaneously?
D. duplexAccess to the full exam of 200-301 CCNA itnv7 with correct answers
Cisco - Designing Cisco Enterprise Networks (ENSLD) - 300-420 ENSLD exam dumps
At which OSI layer does STP operate?
D. Data LinkAccess to the full exam of 300-420 ENSLD with correct answers
Cisco - Implementing and Operating Cisco Data Center Core Technologies (DCCOR) - 350-601 DCCOR exam dumps
Which of the following network devices do not connect to a leaf switch?
A. a spine switch
B. a router
C. another leaf switch
D. an APIC controllerAccess to the full exam of 350-601 DCCOR with correct answers
Cisco - Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) - 350-401 ENCOR exam dumps
Which of the following command sets correctly configures basic IPv6toIPv4 connectivity for NATPT? (Select the best answer.)
A. Router(config)#ipv6 nat prefix 2000:ABC::/32Router(config)#ipv6 nat
B. Router(config)#ipv6 nat prefix 2000:ABC::/64Router(config)#ipv6 nat
C. Router(config)#ipv6 nat prefix 2000:ABC::/96Router(config)#ipv6 nat
D. Router(config)#ipv6 nat prefix 2000:ABC::/32 Router(config)#interface fastethernet 1/1 Router(configif)#ipv6 nat Router(configif)#interface fastethernet 1/2 Router(configif)#ipv6 nat
E. Router(config)#ipv6 nat prefix 2000:ABC::/64 Router(config)#interface fastethernet 1/1 Router(configif)#ipv6 nat Router(configif)#interface fastethernet 1/2 Router(configif)#ipv6 nat
F. Router(config)#ipv6 nat prefix 2000:ABC::/96 Router(config)#interface fastethernet 1/1 Router(configif)#ipv6 nat Router(configif)#interface fastethernet 1/2 Router(configif)#ipv6 natAccess to the full exam of 350-401 ENCOR with correct answers
Cisco - Implementing and Operating Cisco Security Core Technologies (SCOR) - 350-701 SCOR exam dumps
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE.
Which CoA type achieves this goal?
A. Port Bounce
B. CoA Terminate
C. CoA Reauth
D. CoA Session Query
Access to the full exam of 350-701 SCOR with correct answers
Cisco - Implementing Automation for Cisco Collaboration Solutions (CLAUI) - 300-835 exam dumps
A user wants to send message to a person in another room in Cisco webex software. Which of the following response properties can be used for the message to reach the desired user?
A. Id, roomId, roomtype
B. Id, persontext, roomid
C. Id, roomid, personmessage
D. roomid, locationid, personlastnameAccess to the full exam of 300-835 with correct answers
Cisco - Implementing Automation for Cisco Security Solutions (SAUI) - 300-735 SAUTO exam dumps
You issue the following commands on a Cisco ASA with no other configured interfaces:
asa(config)#interface gigabitethernet 0/1
asa(configif)#speed 1000 asa(configif)#duplex full asa(configif)#nameif inside asa(configif)#ip address 10.1.1.1 255.255.255.0 asa(configif)#no shutdown asa(configif)#exit asa(config)#telnet 10.1.1.0 255.255.255.0 inside asa(config)#telnet timeout 30 Which of the following statements is true regarding the resulting configuration? (Select the best
A. Telnet sessions will time out after 30 seconds of inactivity.
B. The ASA will assign the interface a security level of 0.
C. The ASA will assign the interface a security level of 100.
D. Telnet sessions will be denied until a security level is manually assigned.Access to the full exam of 300-735 SAUTO with correct answers
Cisco - Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) - 300-410 ENARSI exam dumps
You executed the following commands to assign an IPv6 link-local address to the Fa0/0 interface of the R1 router:
R1(config)# interface Fa0/0
R1(config-if)# ipv6 ospf 1 area 1
When you executed the show running-config command on the R1 router, you observed that OSPF for IPv6 is not running on the router.
Which of the following commands should be added to the interface configuration?
A. ipv6 router ospf
B. ipv6 enable
C. ipv6 ospf neighbor
D. ipv6 ospf costAccess to the full exam of 300-410 ENARSI with correct answers
CIW - CIW E-Commerce Specialist Certifications exam - 1D0-525 exam dumps
Which of the following is most essential when setting a marketing goal for an e-commerce site?
A. The site must complement the company's direction.
B. The site must conform to the latest technical standards.
C. The site must support efforts to improve customer service.
D. The site must conform to the latest accessibility standards.
Access to the full exam of 1D0-525 with correct answers
CIW - CIW Internet Business Associate - 1D0-61A exam dumps
Selena needs to send a message to her manager providing all the details of a business proposal. The idea they have discussed is critical to the business. The project is considered urgent and confidential. Selena wants to get this outline to her manager as quickly as possible. What would be the most appropriate way Selena could use an SMS (text) message in relation to this proposal?
A. To send a useful summary of the proposal to her manager so that the manager has it available during a presentation
B. To alert her manager that she has sent the proposal via e-mail so her manager can view the proposal as soon as possible
C. To provide a detailed outline of the proposal so that her manager can refer to it as he travels
D. To send the proposal as an attachment to the text message
Access to the full exam of 1D0-61A with correct answers
CIW - CIW Network Technology Associate - 1D0-61C exam dumps
ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
A. Cloud-only solution
B. Regional systems solution
C. Location systems solution
D. Multiple cloud-service providers
Access to the full exam of 1D0-61C with correct answers
CIW - CIW Perl Specialist - 1D0-437 exam dumps
Consider the following program code:
@array = ("one", "two");
What is the output of this code?
Access to the full exam of 1D0-437 with correct answers
CIW - CIW Web Design Specialist - 1D0-520 exam dumps
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. This type of attack is known as a:
A. brute-force attack.
B. forced-entry attack.
C. buffer overflow attack.
D. denial-of-service attack.
Access to the full exam of 1D0-520 with correct answers
CIW - CIW Web Foundations Associate certification exam - 1D0-610 exam dumps
SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. SuperBank's managers are concerned about security. What can SuperBank request to protect its data from security threats?
A. For Local Data Center to run multiple hypervisors
B. For Local Data Center to install a DDoS mitigation system
C. For SuperBank staff to manage the servers at Local Data Center, Inc.
D. For SuperBank to perform background checks on the staff at Local Data Center, Inc.
Access to the full exam of 1D0-610 with correct answers
CIW - User Interface Designer - 1D0-621 exam dumps
You are working on a medium sized website for a company that organizes art fairs. On their website, they have three types of pages. One type of page is for recruiting investors in the company. Another type of page is for selling booth spaces to artists via ecommerce. And the third type of page is promoting the art fairs to the general public. The company has received feedback that the site is confusing, disorganized, and difficult to navigate through. How can this be corrected?
A. Create separate CSS3 files to organize the information on each type of page.
B. Create and apply a set of custom page templates, one for each type of page on the site.
C. Create a site map that links to all of the assets within the site.
D. Redesign the main page template, and apply it to all forms, blog pages, and ecommerce pages.Access to the full exam of 1D0-621 with correct answers
CompTIA - CompTIA A+ - 220-1001 exam dumps
A potential customer of cloud servers needs the ability to ramp up computing resources quickly during traffic spikes. Which of the following features is MOST pertinent to providing this business need?
A. Rapid elasticity
B. Resource pooling
C. Measured service
D. On demandAccess to the full exam of 220-1001 with correct answers
CompTIA - CompTIA CASP+ - CAS-003 exam dumps
A security consultant is conducting a penetration test against a customer enterprise that comprises local hosts and cloud-based servers. The hosting service employs a multitenancy model with elastic provisioning to meet customer demand. The customer runs multiple virtualized servers on each provisioned cloud host. The security consultant is able to obtain multiple sets of administrator credentials without penetrating the customer network. Which of the following is the MOST likely risk the tester exploited?
A. Data-at-rest encryption misconfiguration and repeated key usage
B. Offline attacks against the cloud security broker service
C. The ability to scrape data remnants in a multitenancy environment
D. VM escape attacks against the customer network hypervisorsAccess to the full exam of CAS-003 with correct answers
Question page: 1 ... 10 11 12 13 14 15 16 17 18 19 20 ...