Veritas 850-001 - Cloud Security 1.0 Exam
Page: 2 / 19
Total 91 questions
Question #6 (Topic: )
What can a hosted Symantec Data Loss Prevention solution do to protect confidential data
in an outgoing email?
in an outgoing email?
A. modify the email attachment content to remove confidential information
B. add a header to an email to route to an encryption gateway
C. use a Flex Response plug-in to modify the email header
D. modify the email body to redirect to a quarantine location
Answer: B
Question #7 (Topic: )
A large international wealth management firm has a liberal mobile device policy for its
employees. During the pre-adoption period, strategic documents are accessed and saved
to the mobile devices by the workforce. Which data security technology stops employees
from sending these documents to unauthorized parties?
employees. During the pre-adoption period, strategic documents are accessed and saved
to the mobile devices by the workforce. Which data security technology stops employees
from sending these documents to unauthorized parties?
A. data loss protection technologies
B. two-factor authentication technologies
C. web filtering technologies
D. encryption technologies
Answer: C
Question #8 (Topic: )
A company is invested heavily in migrating their IT infrastructure to an IaaS cloud provider.
It is determined that the storage infrastructure of the service provider resides in a country
with weak laws on data privacy. As a result, the cloud service provider may be required to
turn over the company's data for legal review. Which action could the company take to
prevent the cloud service provider from disclosing the company's data?
It is determined that the storage infrastructure of the service provider resides in a country
with weak laws on data privacy. As a result, the cloud service provider may be required to
turn over the company's data for legal review. Which action could the company take to
prevent the cloud service provider from disclosing the company's data?
A. require the service provider to encrypt the data
B. migrate the infrastructure to a new cloud provider
C. implement their own legal discovery solution
D. implement their own encryption solution
Answer: D
Question #9 (Topic: )
What is a valid security concern when designing a cloud architecture that heavily leverages
SaaS providers?
SaaS providers?
A. lack of a metered model from the cloud provider
B. inefficient workflows for change control
C. inherent flaws in web-based applications
D. inability to support iOS devices
Answer: C
Question #10 (Topic: )
An organization has mandated that workflow for certain SaaS applications must travel over
slower leased lines and through the company's cloud in order to mitigate security concerns
of the CISO. Which end user behavior vulnerability can this cause?
slower leased lines and through the company's cloud in order to mitigate security concerns
of the CISO. Which end user behavior vulnerability can this cause?
A. waiting until close of business to send their data
B. lack of concern with international charges
C. finding an alternate network path
D. disabling personal firewall to maximize bandwidth
Answer: C