SEC M10-M11
Use software-device visibility
Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network. Which of the following should be done by Pat?
A hypervisor that runs directly on computer hardware
What is a Type I hypervisor?
Virtual machine manager
which of the following tools can be used for virtual machine sprawl avoidance?
Firewall virtual appliance
which of the following tools can be used to secure multiple VMs?
Take a snapshot of the virtual machine before testing the configuration
David is asked to test a new configuration on a virtual machine; if it does not work, it should roll back to the older state. What should David do before testing the new configuration so he can roll it back to the previous state if needed?
Creating a virtual network
In a practical test, Steve was asked to securely connect different on-premises computing devices with a database deployed in the cloud. What action is Steve taking?
Containers use OS components for virtualization
In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply?
Mail gateways prevent unwanted mails from being delivered.
In an interview, you were asked to briefly describe how emails containing malware or other contents are prevented from being delivered. Which of the following should be your reply?
IPsec
Which of the following protocol can be used for secure routing and switching?
IPv6
Which of the following protocols can make accessing data using man-in-the-middle attacks difficult while web browsing?
Configure the SMTP relay to limit relays to only local users
You are a security consultant. An enterprise client contacted you because their mail domain is blocked due to an unidentified entity using it to send spam. How should you advise them to prevent this from happening in the future?