Week 10

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a Type I hypervisor?

A hypervisor that runs directly on computer hardware

Which of the following best describes the cloud access security broker?

CASB ensures the security policies of the enterprise comply with the cloud.

Kane was transferring files from a file transfer protocol (FTP) server to his local machine simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and the data port is not encrypted. What protocol did Kane use to transfer the files?

FTPS

Which of the following tools can be used to secure multiple VMs?

Firewall virtual appliance

Which of the following protocols can make accessing data using man-in-the-middle attacks difficult while web browsing?

IPv6

Which of the following is the most versatile cloud model?

IaaS

In an interview, you are asked about the role played by virtual machines in load balancing. Which of the following should be your reply?

If the virtual machine's load increases, the virtual machine can be migrated to another physical machine with more capabilities.

In an interview, you were asked to briefly describe how emails containing malware or other contents are prevented from being delivered. Which of the following should be your reply?

Mail gateways prevent unwanted mails from being delivered.

You are asked to transfer a few confidential enterprise files using the file transfer protocol (FTP). For ensuring utmost security, which variant of FTP should you choose?

SFTP

Mike, an employee at your company, approached you seeking help with his virtual machine. He wants to save the current state of the machine to roll back to the saved state in case of a malfunction. Which of the following techniques can help Mike?

Take snapshots to save the virtual machine state

In an interview, the interviewer asks you to boot a PC. Before the boot process begins, an interface asks you to choose between Windows 10 and Ubuntu Linux. The interviewer then asks you to identify the type of VR monitor program being used. What should your reply be?

Type I hypervisor

Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network. Which of the following should be done by Pat?

Use software-device visibility

Which of the following protects SNMP-managed devices from unauthorized access?

community string

Which of the following is a virtualization instance that uses OS components for virtualization?

container

Which of the following can be achieved using availability zones in cloud computing?

fault tolerance

You are a security consultant. An enterprise client contacted you because their mail domain is blocked due to an unidentified entity using it to send spam. How should you advise them to prevent this from happening in the future?

Configure the SMTP relay to limit relays to only local users

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply?

Containers use OS components for virtualization

Marnus is working as a cloud administrator, and he has been asked to perform segmentation on specific cloud networks. Which of the following should be done by Marnus?

Create network rules for the services permitted between accessible zones to make sure endpoints belonging to other approved zones can reach them.

In a practical test, Steve was asked to securely connect different on-premises computing devices with a database deployed in the cloud. What action is Steve taking?

Creating a virtual network

You are the security manager of an ISP, and you are asked to protect the name server from being hijacked. Which of the following protocols should you use?

DNSSEC

Which of the following is a feature of secrets management?

Default encryption

Which of the following protocol can be used for secure routing and switching?

IPSec

You are working as a cloud administrator, and are asked to migrate a virtual machine to a more capable physical machine, as the demand for the service hosted on the VM increased past its limit. As your enterprise still uses conventional switches, migration took time and resulted in customer dissatisfaction. How should you mitigate this issue in the future?

Implement a software-defined network

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected?

Implement virtual machine escape protection

Which of the following protocols can be used for secure video and voice calling?

SRTP

Which of the following tools can be used to protect containers from attack?

Security-Enhanced Linux

David is asked to test a new configuration on a virtual machine; if it does not work, it should roll back to the older state. What should David do before testing the new configuration so he can roll it back to the previous state if needed?

Take a snapshot of the virtual machine before testing the configuration

You are a cloud administrator, and you are asked to configure a VPC such that backend servers are not publicly accessible. What should you do to achieve this goal?

Use private subnets for backend servers

Your enterprise recently decided to hire new employees as work-from-home interns. For the new employees to work from home, you need to create a network that will allow them to securely access enterprise data from remote locations. Which of the following protocols should you use?

VPN

Which of the following tools can be used for virtual machine sprawl avoidance?

Virtual Machine Manager


Ensembles d'études connexes

Mesoamerican Art History Final Exam

View Set

Chapter 1 : General California Insurance Law

View Set

Information Assurance Final (Ch 8-14)

View Set

Anatomy Dynamic Study Module Gap Finder

View Set

introduction macroeconomics ch 15

View Set

Anderson Physics 195 Midterm 1 Review (Modules 1-7)

View Set

Chapter 25 growth and development of the newborn and infant

View Set