Random Flashcards
A web architect would like to move a company’s website presence to the cloud. One of the management team’s key concerns is resiliency in case a cloud provider’s data center or network connection goes down. Which of the following should the web architect consider to address this concern?
A. Containers
B. Virtual Private Cloud
C. Segmentation
D. Availability Zone
Availability Zone
Availability zones are the most appropriate cloud feature to address the concern of resiliency in case a cloud provider’s data center or network connection goes down.
Which of the following describes where an attacker can purchase DDoS or ransomware services?
A. Threat Intelligence
B. Open Source Intelligence
C. Vulnerability Database
D. Dark Web
Dark Web
A security administrator is managing administrative access to sensitive systems with the following requirements:
- Common login accounts must not be used for administrative duties.
- Administrative accounts must be temporal in nature.
- Each administrative account must be assigned to one specific user.
- Accounts must have complex passwords.
” Audit trails and logging must be enabled on all systems.
A. ABAC
B. SAML
C. PAM
D. CASB
PAM
PAM is a solution that enables organizations to securely manage users’ accounts and access to sensitive systems. It allows administrators to create unique and complex passwords for each user, as well as assign each account to a single user for administrative duties.
Company XYZ has been implementing Microsoft Office Communications Server 2007 R2 servers, unified communications clients, and unified communications applications.
They are now conducting the transition from solution to support. This project phase is referred to as?
A. Release
B. Operation
C. Retirement
D. Deployment
Operation
Technology Solutions Center is a reputable high achieving software development company. The company attributes her success in following strict SDLC.
After successfully carrying out requirement gathering and analysis and design, what other phases should follow in order?
A. Coding and Implementation, Testing, Deployment, Maintenance
B. Staging, Development, Test and Production environments
C. Test, Development, Staging and Production environments
D. Deployment, Coding and Implementation, Testing, Production environments
Coding and Implementation, Testing, Deployment, Maintenance
Disaster recovery testing involves simulating an IT failure or any other type of business disruption to assess a DR plan. The following are methods of testing a DRP except?
A. Checklist Testing
B. Parallel Testing
C. Simulation Testing
D. Emulation Testing
Emulation Testing
An MX record in DNS can help mitigate what type of Malware?
A. Rootkit
B. Bot
C. Phishing and Spear Phishing
D. Adware
Phishing and Spear Phishing
Organizations has robust incidence response strategy. The following are steps one would normally take after a cybersecurity incident has occurred.
In what order would you apply them?
A. Identification, Triage and analysis, Containment, Post-incident activity
B. Identification, Containment, Triage and analysis, Post-incident activity
C. Triage and analysis, Identification, Containment, Post-incident activity
D. Identification, Containment, Post-incident activity, Triage and analysis
Identification, Triage and analysis, Containment, Post-incident activity
Diffrence between Hypervisor I and Hypervisor II
A)Hypervisor I(Bare Metal) easy to manage and is flexible/ Hypervisor II(Application) offers more security.
B)Hypervisor II(Applications)easy to manage and is flexible/ Hypervisor I(Bare Metal) offers more security
B)Hypervisor II(Applications)easy to manage and is flexible/ Hypervisor I(Bare Metal) offers more security
Which of the following attacks would be rendered ineffective by the use of Salting?
A. Hash
B. Brute Force
C. Dictionary Attack
D.Rainbow Table
Rainbow Tables
What type of malware is adware typically classified as?
A. DOG
B. Backdoor
C. PUP
D. Rootkit
B. Backdoor
Nancy is concerned that there is a software keylogger on the system she is investigating. What data may have been stolen?
A. All files on the system
B. All keyboard input
C. All files the user access while the
keylogger was active
D, Keyboard and other input from the user
keyboard and other input from the user
Which of the following would a security specialist be able to determine upon examination of a server’s certificate?
A. CA public key
B. Server private key
C. CSR
D. OID
D. OID
A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format?
A. PFX
B. PEM
C. DER
D. CER
PEM
Answer which port is which?
FTP
Telnat
SMTP
SNMP
SCP
TFTP
21
23
25
161
22
69
Put theses is order
SWAP, RAM, Cache Hard Drive
Cache, RAM, SWAP, Hard Drive