April 2022

Article

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Alan is working with a cloud provider to implement a new service that places IoT sensors at the edge of his network, allowing those devices to perform some computation locally, and then connects those devices to the cloud provider. What term best describes this approach? A. Hybrid Cloud Computing B. Fog Computing C. Public Cloud Computing D. Private Cloud Computing Correct Answer: B This scenario does not give us enough information to determine whether the cloud provider is performing computation in a public cloud or private cloud model. So neither public or private cloud computing is our correct answer here. This approach, which mixes the local computation on edge devices with the use of a remote cloud offering, is known as fog computing, making it our correct answer. There is also no indication that the customer site has a cloud environment in this scenario. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Chelsea believes that an attacker has compromised the private key for her web server's digital certificate. What action should she take? A. Change the certificate’s public key B. Change the certificate’s private key C. Revoke the certificate D. No action necessary Correct Answer: C The private key for a digital certificate is very sensitive information and must be safeguarded. If a private key is compromised, the digital certificate should be immediately revoked. It is not possible to change the keys for a certificate. The certificate must be revoked and reissued. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...