228 Chapter 9 ■ Practice Test 1
- Which one of the following memory types is considered volatile memory?
A. Flash
B. EEPROM
C. EPROM
D. RAM - Ursula believes that many individuals in her organization are storing sensitive information
on their laptops in a manner that is unsafe and potentially violates the organization’s secu-
rity policy. What control can she use to identify the presence of these files?
A. Network DLP
B. Network IPS
C. Endpoint DLP
D. Endpoint IPS - In what cloud computing model does the customer build a cloud computing environment
in his or her own data center or build an environment in another data center that is for the
customer’s exclusive use?
A. Public cloud
B. Private cloud
C. Hybrid cloud
D. Shared cloud - Which one of the following technologies is designed to prevent a web server going offline
from becoming a single point of failure in a web application architecture?
A. Load balancing
B. Dual-power supplies
C. IPS
D. RAID - Alice wants to send Bob a message with the confidence that Bob will know the message
was not altered while in transit. What goal of cryptography is Alice trying to achieve?
A. Confidentiality
B. Nonrepudiation
C. Authentication
D. Integrity