Veritas 850-001 - Cloud Security 1.0 Exam

Question #1 (Topic: )
A company is reaching their maximum CPU load for their email and Web servers, and
begins investigation of public IaaS cloud bursting. The company is concerned about
complex attack vectors launched against the hosted systems. To protect the assets, a
number of Symantec security products will also be migrated. Which Symantec security
solution provides continuous system visibility across all devices and facilitates detection of
complex attack vectors?
A. Critical System Protection B. Security Information Manager C. Gateway Security D. Endpoint Protection with Network Threat Protection
Answer: B
Question #2 (Topic: )
What is the most effective strategy for an IT professional to implement an IT governance,
risk, and compliance solution in a private cloud?
A. use a checkbox approach to gather IT controls manually to identify high-risk vulnerabilities B. utilize Excel spreadsheets, email-based questionnaires, or SharePoint sites to thoroughly document IT controls C. ensure anti-virus is deployed on all critical assets to stay ahead of threats and avoid data breaches D. put an automated program in place to identify vulnerabilities and security gaps and to track remediation
Answer: A
Question #3 (Topic: )
Which factor exists in many organizations that inhibits an effective IT Governance, Risk,
and Compliance program?
A. High-level reports and dashboards provide a C-Level view of the enterprise risk posture. B. Policies tied to controls are defined to address multiple regulations and frameworks. C. Technical controls on assets from multiple business units are regularly evaluated to determine aggregate risk. D. Numerous assessment tools are deployed throughout the enterprise, generating vendor- specific reports.
Answer: D
Question #4 (Topic: )
An enterprise is in the process of moving application servers to a cloud-based IaaS
platform. Which technology should an IT professional use to assess the risk of the IT
assets in a business context?
A. Symantec Control Compliance Suite B. Symantec Critical Systems Protection C. Symantec Data Loss Prevention D. Symantec Validation and Identity Protection
Answer: D
Question #5 (Topic: )
A cloud service customer is facing application failure and data corruption in their virtual
infrastructure. The IT department has asked for a solution that will scan for rogue virtual
machines, which will reduce the security risk in physical and virtual infrastructure. Which
solution can fulfill the requirement?
A. Symantec Critical Systems Protection B. Symantec Control Compliance Suite C. Symantec Endpoint Protection D. Symantec Security Information Manager
Answer: B
Download Exam
Page: 1 / 19
Total 91 questions