Question: 1
Which of the following helps prevent executing untrusted or untested programs or code from untrusted or unverified third-parties?
Question: 2
If an organization has decided to consume PaaS Cloud service model, then identify the organization's responsibility that they need to look after based on shared responsibility model.
A Data, interfaces, application, etc.
B Data, interfaces, application, middleware, OS, VM, virtual network, etc.
C Data, interfaces, application, middleware, OS, VM, virtual network, hypervisors, processing and memory, data storage, network interfaces, facilities and data centers, etc.
D Data, interfaces, etc.
Answer : A
Show Answer
Hide Answer
Question: 3
Blake is working on the company's updated disaster and business continuity plan. The last section of the plan covers computer and data incidence response. Blake is outlining the level of severity for each type of
incident in the plan. Unsuccessful scans and probes are at what severity level?
Question: 4
George was conducting a recovery drill test as a part of his network operation. Recovery drill tests are conducted on the______________.
Question: 5
An attacker uses different types of password cracking techniques to crack the password and gain unauthorized access to a system. An attacker uses a file containing a list of commonly used passwords. They then
upload this file into the cracking application that runs against the user accounts. Which of the following password cracking techniques is the attacker trying?