1. Right Answer: D
Explanation: The following is a list of the most popular biometric methods, ranked by user acceptance, starting with the methods that are most popular: 1. Voice pattern 2. Keystroke pattern 3. Signature dynamics 4. Hand geometry 5. Hand print 930 6. Fingerprint 7. Iris scan 8. Retina scan
2. Right Answer: C
Explanation: Hadoop is an open-source software framework used for distributed storage and processing of big data.
3. Right Answer: B
Explanation: Sender Policy Framework (SPF) is an email validation system that works by using DNS to determine whether an email sent by someone has been sent by a host sanctioned by that domain s administrator. If it can t be validated, it is not delivered to the recipient s inbox.
4. Right Answer: D
Explanation: You should consider open standards, de facto standards, and de jure standards.
5. Right Answer: B
Explanation: A cloud security broker, or cloud access security broker (CASB), is a software layer that operates as a gatekeeper between an organization s on-premise network and a provider s cloud environment.