100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada
logo-home
Chapter 10 & 14 Questions &Exam (elaborations) answers 100% satisfaction guarantee $7.99   Añadir al carrito

Examen

Chapter 10 & 14 Questions &Exam (elaborations) answers 100% satisfaction guarantee

 6 vistas  0 veces vendidas
  • Grado
  • Chapter
  • Institución
  • Chapter

Chapter 10 & 14 Questions &Exam (elaborations) answers 100% satisfaction guarantee

Vista previa 2 fuera de 6  páginas

  • 11 de agosto de 2024
  • 6
  • 2024/2025
  • Examen
  • Preguntas y respuestas
  • Chapter
  • Chapter
avatar-seller
Chapter 10 & 14
You are a security consultant. An enterprise client contacted you because their mail domain is
blocked due to an unidentified entity using it to send spam. How should you advise them to prevent
this from happening in the future? - ✔✔Configure the SMTP relay to limit relays to only local users




%
You are the security manager of an ISP, and you are asked to protect the name server from being
hijacked. Which of the following protocols should you use? - ✔✔DNSSEC

In an interview, the interviewer asks you to boot a PC. Before the boot process begins, an interface
asks you to choose between Windows 10 and Ubuntu Linux. The interviewer then asks you to identify
the type of VR monitor program being used. What should your reply be? - ✔✔Type I hypervisor




0
Which of the following is a feature of secrets management? - ✔✔Default encryption

Mike, an employee at your company, approached you seeking help with his virtual machine. He wants
to save the current state of the machine to roll back to the saved state in case of a malfunction. Which




0
of the following techniques can help Mike? - ✔✔Take snapshots to save the virtual machine state

Which of the following can be achieved using availability zones in cloud computing? - ✔✔fault
tolerance




1
Kane was transferring files from a file transfer protocol (FTP) server to his local machine
simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and
the data port is not encrypted. What protocol did Kane use to transfer the files? - ✔✔FTPS

You decided to test a potential malware application by sandboxing. However, you want to ensure that
if the application is infected, it will not affect the host operating system. What should you do to ensure
that the host OS is protected? - ✔✔Implement virtual machine escape protection

You are a cloud administrator, and you are asked to configure a VPC such that backend servers are
not publicly accessible. What should you do to achieve this goal? - ✔✔Use private subnets for
backend servers

Which of the following tools can be used to secure multiple VMs? - ✔✔Firewall virtual appliance

Which of the following protocols can be used for secure video and voice calling? - ✔✔SRTP

, In an interview, you are asked about the role played by virtual machines in load balancing. Which of
the following should be your reply? - ✔✔If the virtual machine's load increases, the virtual machine
can be migrated to another physical machine with more capabilities.

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should
Tom reply? - ✔✔Containers use OS components for virtualization




%
Which of the following is the most versatile cloud model? - ✔✔IaaS

In an interview, you were asked to briefly describe how emails containing malware or other contents
are prevented from being delivered. Which of the following should be your reply? - ✔✔Mail gateways
prevent unwanted mails from being delivered.




0
You are a security administrator for an enterprise. You were asked to implement a cloud app security
function in your enterprise network so that login attempts from identified threat actors can be
restricted. Which of the following cloud app security function should you use? - ✔✔Risky IP address




0
You want to examine every future login attempt made on the enterprise devices. Which of the
following windows group policy settings should you enable to make sure every login attempt is
logged? - ✔✔Account audits




1
You work at the headquarters of an enterprise known for unethical practices. The company has many
remote sites, but most functions are performed at one location. Your enterprise recently hired a
third-party vendor known for high-accuracy business impact analyses. The BIA performed by the
vendor has since proved wrong, as an incident impacted the business significantly more than
forecast. You are assigned to conduct a study on the BIA's misconception and submit a report.

What should you investigate as the possible reason for the BIA's inaccuracy? - ✔✔The vendor
overlooked the organization's remote sites.

Which of the following best describes an acceptable use policy? - ✔✔A policy that defines the
actions users may perform while accessing systems and networking equipment

After a disaster disrupted your organization's functioning, you were assigned to determine the
sequence for reinstating systems. Which of the following documents should you refer to when
deciding the restoration order? - ✔✔Data recovery plan

"Computer workstations must be locked when the workspace is unoccupied and turned off at the end
of the business day." "Laptops must be either locked with a locking cable or locked in a drawer or
filing cabinet."

Los beneficios de comprar resúmenes en Stuvia estan en línea:

Garantiza la calidad de los comentarios

Garantiza la calidad de los comentarios

Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!

Compra fácil y rápido

Compra fácil y rápido

Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.

Enfócate en lo más importante

Enfócate en lo más importante

Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable. Así llegas a la conclusión rapidamente!

Preguntas frecuentes

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

100% de satisfacción garantizada: ¿Cómo funciona?

Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.

Who am I buying this summary from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EXAMQA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy this summary for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

45,681 summaries were sold in the last 30 days

Founded in 2010, the go-to place to buy summaries for 14 years now

Empieza a vender
$7.99
  • (0)
  Añadir