1. Right Answer: D
Explanation: A private cloud is a solution owned and managed by one company solely for that company s use. It provides the most control and security but also requires the biggest investment in both hardware and expertise.
2. Right Answer: B
Explanation: You should first determine whether authentication can be used. Users should use authentication when accessing private or confidential data.
3. Right Answer: D
Explanation: The IETF is responsible for creating requests for comments (RFCs) that describe research and innovations on the Internet and its systems. Most RFCs are submitted for peer review, and, once approved, are published as Internet standards.
4. Right Answer: D
Explanation: All changes should be formally requested. The following are some change management guidelines: Each request should be analyzed to ensure that it supports all goals and policies. Prior to formal approval, all costs and effects of the methods of implementation should be reviewed. After changes are approved, the change steps should be developed. During implementation, incremental testing should occur, and it should rely on a predetermined fallback strategy, if necessary. Complete documentation should be produced and submitted with a formal report to management.
5. Right Answer: A
Explanation: ECC is not a hash function. It is an asymmetric algorithm. All the other options are hash functions.