Tuesday, December 7, 2021

Cloud Security Practice Exam

 1
Correct


API Connect with DataPower gateway has two gateway script methods related to JWT. Which of the following is indicative of this gateway script?
Select one:

a.
jwt-generate

b.
jwt-authenticate

c.
jwt-authorize

d.
jwt-select
Question 2
Correct
Not flaggedFlag question
Question text
Cloud security attacks happen either on premise, external or Cloud. Which of the following example depicts an attack on premise?
Select one:

a.
Unauthorized access via the internal network

b.
Traffic between customer and cloud site being read e.g. uncrypted data for a test environment

c.
Data being read when exchanged between applications in the cloud

d.
Hacked access via phishing
Question 3
Correct
Not flaggedFlag question
Question text
If you had to choose the highest malware growth with cloud security concerns, which of the following would come to mind first?
Select one:

a.
mobile malware

b.
sophisticated attacks

c.
reputations being damaged

d.
vendor fraud
Question 4
Correct
Not flaggedFlag question
Question text
API Connect with DataPower gateway has two gateway script methods related to JWT. Which of the following is indicative of this gateway script?
Select one:

a.
jwt-validate

b.
jwt-authenticate

c.
jwt-authorize

d.
jwt-select
Question 5
Incorrect
Not flaggedFlag question
Question text
Secure authentication and authorization requires that the communication is _________. Fill in the blank.
Select one:

a.
private

b.
secure

c.
encrypted

d.
authorized
Question 6
Correct
Not flaggedFlag question
Question text

Which of the following is an example of regulatory compliance?
Select one:

a.
GDPR

b.
RESTful services

c.
OAuth

d.
BasicAuth

Question 7
Correct
Not flaggedFlag question
Question text
Security technologies and controls are most effective to protect data in the cloud include: data encryption, network encryption, access control and intrusion detection. Which tops the list as the most effective way to secure your data?
Select one:

a.
data encryption

b.
network encryption

c.
access control

d.
intrusion detection
Question 8
Correct
Not flaggedFlag question
Question text
To Monitor and identify application usage patterns pointing to misuse is best described by which of the following cloud security dimensions?
Select one:

a.
Data encryption

b.
intrusion detection

c.
Compliance

d.
Access control

Cloud and AI Practice Exam

Digressions allow for the user to break away from a specific conversation in order to temporarily change the topic before returning to the original dialog flow. How do you set up digressions in Watson Assistant?
Select one:

a.
From the Intent tab

b.
From the Entity tab

c.
From the Dialog tab

d.
From Content Catalog tab
Question 2
Correct
Not flaggedFlag question
Question text
As it becomes harder to reach customers with advertising, companies now look to content marketing to produce unique stories that will drive traffic and increase brand awareness. Also, as more people use ad blockers, the traditional method of monetizing content is rapidly waning. In response, this leads businesses to engage in more compelling ways, primarily through better content and unique storytelling. Which technologies below are best suited for such challenges?
Select one:

a.
Recommendation engine

b.
virtual agents

c.
natural language understanding techniques

d.
all of the above


Question 3
Incorrect
Not flaggedFlag question
Question text
Understanding natural language is one of the most challenging endeavors for a machine to realize. Which of the following NLP technologies tries to address these challenges?
Select one:

a.
Keyword extraction

b.
One-hot encoding

c.
recommendation engine

d.
image analysis


Question 4
Correct
Not flaggedFlag question
Question text
Which of the following is an example of an Intent used in the Watson Assistant service?
Select one:

a.
#turn_on

b.
@turn_on

c.
%turn_on

d.
$turn_on

Question 5


Correct


The dialog uses the _________ that are identified in the user's input, plus context from the application, to interact with the user and ultimately provide a useful response.
Select one:

a.
Intents

b.
Entities

c.
Content Catalog

d.
System Entities

Data in the Cloud Practice Exam

Think of these: validating, cleansing, and _________ data as pipes or filters in a data pathway. Either you are moving data from one place to another, or you are changing, converting or augmenting that data. Fill in the blank. Select one: a. parsing b. converting c. enriching d. munging Question 2 Correct Not flaggedFlag question Question text When using NoSQL as your non-relational database, which of the following tools is the preferred approach? Select one: a. JanusGraph b. Redit c. Redis d. Cloudant Question 3 Correct Not flaggedFlag question Question text The CAP Theorem states that: Select one: a. When partitioned, either consistency or availability must be sacrificed b. To maintain availability, most databases are configured to sacrifice consistency c. When the partitioning is resolved, synchronization reestablishes consistency d. Applications must tolerate the possibility that two reads may produce inconsistent results Question 4 Correct Not flaggedFlag question Question text If you want to provide an _id and insert by using PUT, then the _id must be in the ______________. Complete the sentence with one of the below Select one: a. document b. URL c. column heading d. index Question 5 Correct Not flaggedFlag question Question text To Shape raw data by filtering values and columns from the source data, sort, remove duplicates, and understand the quality of the data through standardized scores is commonly know as: Select one: a. Making an API call b. Performing CRUD operations c. Data Refinery d. data retrieval Question 6 Correct Not flaggedFlag question Question text Which of the following consideration applies when using NoSQL? Select one: a. Faster prototyping b. No need for strict data typing, schema-less c. No need to throw away non-conforming data d. All of the above Question 7 Correct Not flaggedFlag question Question text If you want to provide an _id and insert by using POST, then the _id must be in the ______________. Complete the sentence with one of the below Select one: a. document b. URL c. column heading d. index Question 8 Correct Not flaggedFlag question Question text In the CAP Theorem, which of the following is an example of partition tolerance? Select one: a. when two nodes can't talk to each other, but there are clients able to talk to either one or both of those nodes. b. A read is guaranteed to return the most recent write for a given client. c. A non-failing node will return a reasonable response within a reasonable amount of time (no error or timeout). d. All of the above

Understanding natural language

Understanding natural language is one of the most challenging endeavors for a machine to realize. Which of the following NLP technologies tries to address these challenges? Select one: a. Keyword extraction b. One-hot encoding c. recommendation engine d. image analysis Secure authentication and authorization requires that the communication is _________. Fill in the blank. Select one: a. private b. secure c. encrypted d. authorized