Question 61
Which activity is conducted during the service termination phase of the cloud service lifecycle?
Question 62
What capability is provided by the "Open and extensible" attribute of software-defined infrastructure (SDI)?
Question 63
A specific intrusion detection and prevention system (IDPS) scans events against known attack patterns.
Which technique is the IDPS using?
Question 64
Which compliance standard provides policies and procedures to optimize the security of credit card transactions?
Question 65
In which technique does an application maintain limited functionality, even when some of the modules or supporting services of that application become unavailable?
