Which of the following statement holds true in terms of containers?
D
Damian is the chief security officer of Enigma Electronics. To block intruders and prevent any
environmental accidents, he needs to set a two-factor authenticated keypad lock at the entrance, rig
a
fire
suppression system, and link any video cameras at various corridors to view the feeds in the
surveillance room. What layer of network defense-in-depth strategy is he trying to follow?
A
Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the
company can deny getting email notifications or any other communication, she mandates
authentication
before a connection establishment or message transfer occurs. What fundamental attribute of
network defense is she enforcing?
B
Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in
the system, which can be exploited by the attackers. Which among the following is the correct syntax
for
disabling a service?
B
Identify the virtualization level that creates a massive pool of storage areas for different virtual
machines running on the hardware.
B
How is an “attack” represented?
A
Sophie has been working as a Windows network administrator at an MNC over the past 7 years. She
wants to check whether SMB1 is enabled or disabled. Which of the following command allows
Sophie
to do so?
B
Albert works as a Windows system administrator at an MNC. He uses PowerShell logging to identify
any suspicious scripting activity across the network. He wants to record pipeline execution details as
PowerShell executes, including variable initialization and command invocations. Which PowerShell
logging component records pipeline execution details as PowerShell executes?
A
Elden is working as a network administrator at an IT company. His organization opted for a
virtualization technique in which the guest OS is aware of the virtual environment in which it is
running
and
communicates with the host machines for requesting resources. Identify the virtualization technique
implemented by Eldens organization.
B
Fargo, head of network defense at Globadyne Tech, has discovered an undesirable process in several
Linux systems, which causes machines to hang every 1 hour. Fargo would like to eliminate it; what
command should he execute?
D
Emmanuel works as a Windows system administrator at an MNC. He uses PowerShell to enforce the
script execution policy. He wants to allow the execution of the scripts that are signed by a trusted
publisher. Which of the following script execution policy setting this?
A
To provide optimum security while enabling safe/necessary services, blocking known dangerous
services, and making employees accountable for their online activity, what Internet Access policy
would
Brian, the network administrator, have to choose?
A
Choose the correct order of steps to analyze the attack surface.
D
In _______ mechanism, the system or application sends log records either on the local disk or over
the network.
C
Which among the following filter is used to detect a SYN/FIN attack?
D