00:00

QUESTION 11

CCM: In the CCM tool, “Encryption and Key Management” is an example of which of the following?

Correct Answer: B

QUESTION 12

In volume storage, what method is often used to support resiliency and security?

Correct Answer: D

QUESTION 13

Use elastic servers when possible and move workloads to new instances.

Correct Answer: B

QUESTION 14

How can virtual machine communications bypass network security controls?

Correct Answer: A

QUESTION 15

What is defined as the process by which an opposing party may obtain private documents for use in litigation?

Correct Answer: A