A company is reaching their maximum CPU load for their email and Web servers, and begins investigation of public IaaS cloud bursting. The company is concerned about complex attack vectors launched against the hosted systems. To protect the assets, a number of Symantec security products will also be migrated. Which Symantec security solution provides continuous system visibility across all devices and facilitates detection of complex attack vectors?
Answer : B
What is the most effective strategy for an IT professional to implement an IT governance, risk, and compliance solution in a private cloud?
Answer : A
Which factor exists in many organizations that inhibits an effective IT Governance, Risk, and Compliance program?
Answer : D
An enterprise is in the process of moving application servers to a cloud-based IaaS platform. Which technology should an IT professional use to assess the risk of the IT assets in a business context?
Answer : D
A cloud service customer is facing application failure and data corruption in their virtual infrastructure. The IT department has asked for a solution that will scan for rogue virtual machines, which will reduce the security risk in physical and virtual infrastructure. Which solution can fulfill the requirement?
Answer : B