Fall : Class 2 : Quiz 10

Ace your homework & exams now with Quizwiz!

Which of the following is a feature of secrets management ?

Default encryption

What is a Type I hypervisor ?

A hypervisor that runs directly on computer hardware

Which of the following best describes the cloud access security broker ?

CASB ensures the security policies of the enterprise comply with the cloud .

Which of the following protects SNMP - managed devices from unauthorized access ?

Community string

Which of the following is a virtualization instance that uses OS components for virtualization ?

Container

Marnus is working as a cloud administrator , and he has been asked to perform segmentation on specific cloud networks . Which of the following should be done by Marnus ?

Create network rules for the services permitted between accessible zones to make sure endpoints belonging to other approved zones can reach them .

You are the security manager of an ISP , and you are asked to protect the name server from being hijacked . Which of the following protocols should you use ?

DNSSEC

Kane was transferring files from a file transfer protocol ( FTP ) server to his local machine simultaneously . He sniffed the traffic to find that only the control port commands are encrypted , and the data port is not encrypted . What protocol did Kane use to transfer the files ?

FTPS

You are asked to transfer a few confidential enterprise files using the file transfer protocol ( FTP ) . For ensuring utmost security , which variant of FTP should you choose ?

SFTP

Which of the following protocols can be used for secure video and voice calling ?

SRTP

Mike , an employee at your company , approached you seeking help with his virtual machine . He wants to save the current state of the machine to roll back to the saved state in case of a malfunction . Which of the following techniques can help Mike ?

Take snapshots to save the virtual machine state

In an interview the interviewer asks you to boot a PC . Before the boot process begins , an interface asks you to choose between Windows 10 and Ubuntu Linux . The interviewer then asks you to identify the type of VR monitor program being used . What should your reply be ?

Type I hypervisor

Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network . Which of the following should be done by Pat ?

Use software - device visibility

Your enterprise recently decided to hire new employees as work - from - home interns . For the new employees to work from home , you need to create a network that will allow them to securely access enterprise data from remote locations. Which of the following protocols should you use ?

VPN

Which of the following is the most versatile cloud model ?

laaS

You are a security consultant . An enterprise client contacted you because their mail domain is blocked due to an unidentified entity using it to send spam . How should you advise them to prevent this from happening in the future ?

Configure the SMTP relay to limit relays to only local users

In an interview , Tom was asked to give a brief on how containers perform virtualization . How should Tom reply ?

Containers use OS components for virtualization

In a practical test , Steve was asked to securely connect different on - premises computing devices with a database deployed in the cloud . What action is Steve taking ?

Creating a virtual network

Which of the following can be achieved using availability zones in cloud computing ?

Fault tolerance

Which of the following tools can be used to secure multiple VMS ?

Firewall virtual appliance

Which of the following protocol can be used for secure routing and switching ?

IPsec

Which of the following protocols can make accessing data using man - in - the - middle attacks difficult while web browsing ?

IPv6

In an interview , you are asked about the role played by virtual machines in load balancing . Which of the following should be your reply ?

If the virtual machine's load increases , the virtual machine can be migrated to another physical machine with more capabilities .

You are working as a cloud administrator , and are asked to migrate a virtual machine to a more capable physical machine , as the demand for the service hosted on the VM increased past its limit . As your enterprise still uses conventional switches , migration took time and resulted in customer dissatisfaction . How should you mitigate this issue in the future ?

Implement a software - defined network

You decided to test a potential malware application by sandboxing . However , you want to ensure that if the application is infected , it will not affect the host operating system . What should you do to ensure that the host OS is protected ?

Implement virtual machine escape protection

In an interview , you were asked to briefly describe how emails containing malware or other contents are prevented from being delivered . Which of the following should be your reply ?

Mall gateways prevent unwanted mails from being delivered .

Which of the following tools can be used to protect containers from attack ?

Security - Enhanced Linux

David is asked to test a new configuration on a virtual machine ; if it does not work , it should roll back to the older state . What should David do before testing the new configuration so he can roll it back to the previous state if needed ?

Take a snapshot of the virtual machine before testing the configuration

You are a cloud administrator , and you are asked to configure a VPC such that backend servers are not publicly accessible . What should you do to achieve this goal ?

Use private subnets for backend servers

Which of the following tools can be used for virtual machine sprawl avoidance ?

Virtual machine manager


Related study sets

Henry David Thoreau - "Civil Disobedience" QUIZ 100% CORRECT

View Set

A&P Immune system- White blood cells

View Set

Introduction to science Quizizz Review

View Set

PSY 2012 Ch. 13: Social Psychology Focus Practice Set

View Set

Chapter 9: Understanding and Capturing Customer Value

View Set