100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Chapter 10 & 14 Questions &Exam (elaborations) answers 100% satisfaction guarantee CA$11.49   Add to cart

Exam (elaborations)

Chapter 10 & 14 Questions &Exam (elaborations) answers 100% satisfaction guarantee

 6 views  0 purchase
  • Course
  • Chapter
  • Institution
  • Chapter

Chapter 10 & 14 Questions &Exam (elaborations) answers 100% satisfaction guarantee

Preview 2 out of 6  pages

  • August 11, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Chapter
  • Chapter
avatar-seller
Chapter 10 & 14
You are a security consultant. An enterprise client contacted you because their mail domain is
blocked due to an unidentified entity using it to send spam. How should you advise them to prevent
this from happening in the future? - ✔✔Configure the SMTP relay to limit relays to only local users




%
You are the security manager of an ISP, and you are asked to protect the name server from being
hijacked. Which of the following protocols should you use? - ✔✔DNSSEC

In an interview, the interviewer asks you to boot a PC. Before the boot process begins, an interface
asks you to choose between Windows 10 and Ubuntu Linux. The interviewer then asks you to identify
the type of VR monitor program being used. What should your reply be? - ✔✔Type I hypervisor




0
Which of the following is a feature of secrets management? - ✔✔Default encryption

Mike, an employee at your company, approached you seeking help with his virtual machine. He wants
to save the current state of the machine to roll back to the saved state in case of a malfunction. Which




0
of the following techniques can help Mike? - ✔✔Take snapshots to save the virtual machine state

Which of the following can be achieved using availability zones in cloud computing? - ✔✔fault
tolerance




1
Kane was transferring files from a file transfer protocol (FTP) server to his local machine
simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and
the data port is not encrypted. What protocol did Kane use to transfer the files? - ✔✔FTPS

You decided to test a potential malware application by sandboxing. However, you want to ensure that
if the application is infected, it will not affect the host operating system. What should you do to ensure
that the host OS is protected? - ✔✔Implement virtual machine escape protection

You are a cloud administrator, and you are asked to configure a VPC such that backend servers are
not publicly accessible. What should you do to achieve this goal? - ✔✔Use private subnets for
backend servers

Which of the following tools can be used to secure multiple VMs? - ✔✔Firewall virtual appliance

Which of the following protocols can be used for secure video and voice calling? - ✔✔SRTP

, In an interview, you are asked about the role played by virtual machines in load balancing. Which of
the following should be your reply? - ✔✔If the virtual machine's load increases, the virtual machine
can be migrated to another physical machine with more capabilities.

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should
Tom reply? - ✔✔Containers use OS components for virtualization




%
Which of the following is the most versatile cloud model? - ✔✔IaaS

In an interview, you were asked to briefly describe how emails containing malware or other contents
are prevented from being delivered. Which of the following should be your reply? - ✔✔Mail gateways
prevent unwanted mails from being delivered.




0
You are a security administrator for an enterprise. You were asked to implement a cloud app security
function in your enterprise network so that login attempts from identified threat actors can be
restricted. Which of the following cloud app security function should you use? - ✔✔Risky IP address




0
You want to examine every future login attempt made on the enterprise devices. Which of the
following windows group policy settings should you enable to make sure every login attempt is
logged? - ✔✔Account audits




1
You work at the headquarters of an enterprise known for unethical practices. The company has many
remote sites, but most functions are performed at one location. Your enterprise recently hired a
third-party vendor known for high-accuracy business impact analyses. The BIA performed by the
vendor has since proved wrong, as an incident impacted the business significantly more than
forecast. You are assigned to conduct a study on the BIA's misconception and submit a report.

What should you investigate as the possible reason for the BIA's inaccuracy? - ✔✔The vendor
overlooked the organization's remote sites.

Which of the following best describes an acceptable use policy? - ✔✔A policy that defines the
actions users may perform while accessing systems and networking equipment

After a disaster disrupted your organization's functioning, you were assigned to determine the
sequence for reinstating systems. Which of the following documents should you refer to when
deciding the restoration order? - ✔✔Data recovery plan

"Computer workstations must be locked when the workspace is unoccupied and turned off at the end
of the business day." "Laptops must be either locked with a locking cable or locked in a drawer or
filing cabinet."

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EXAMQA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83662 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


CA$11.49
  • (0)
  Add to cart