A native hypervisor runs:

A native hypervisor runs:A . with extreme demands on network throughputB . only on certain platformsC . within an operating system’s environmentD . directly on the host computer’s hardwareView AnswerAnswer: D Explanation: ● Type 1 (native or bare metal). Runs directly on the host computer’s hardware ● Type 2 (hosted)....

September 21, 2024 No Comments READ MORE +

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?A . weaponizationB . reconnaissanceC . exploitationD . deliveryView AnswerAnswer: A Explanation: "Weaponization: Next, attackers determine which methods to use to compromise a target endpoint. They may choose to embed intruder code within seemingly innocuous...

September 20, 2024 No Comments READ MORE +

Match the IoT connectivity description with the technology

DRAG DROP Match the IoT connectivity description with the technology. View AnswerAnswer: Explanation: Short-range wireless: ● Adaptive Network Technology+ (ANT+): ANT+ is a proprietary multicast wireless sensor network technology primarily used in personal wearables, such as sports and fitness sensors. ● Bluetooth/Bluetooth Low-Energy (BLE): Bluetooth is a low-power, short-range communications...

September 20, 2024 No Comments READ MORE +

Which aspect of a SaaS application requires compliance with local organizational security policies?

Which aspect of a SaaS application requires compliance with local organizational security policies?A . Types of physical storage media usedB . Data-at-rest encryption standardsC . Acceptable use of the SaaS applicationD . Vulnerability scanning and managementView AnswerAnswer: C Explanation: SaaS applications are cloud-based software that users can access from anywhere...

September 20, 2024 No Comments READ MORE +

Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?

Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?A . You may have to use port numbers greater than 1024 for your business-critical applications.B . You may have to open up multiple ports and these ports...

September 18, 2024 No Comments READ MORE +

Which subnet does the host 192.168.19.36/27 belong?

Which subnet does the host 192.168.19.36/27 belong?A . 192.168.19.0B . 192.168.19.16C . 192.168.19.64D . 192.168.19.32View AnswerAnswer: B Explanation: To find the subnet that the host 192.168.19.36/27 belongs to, we need to convert the IP address and the subnet mask to binary form and perform a logical AND operation. The /27...

September 16, 2024 No Comments READ MORE +

On an endpoint, which method should you use to secure applications against exploits?

On an endpoint, which method should you use to secure applications against exploits?A . endpoint-based firewallB . strong user passwordsC . full-disk encryptionD . software patchesView AnswerAnswer: D Explanation: Software patches are updates that fix bugs, vulnerabilities, or performance issues in applications. Applying software patches regularly is one of the...

September 16, 2024 No Comments READ MORE +

Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?

Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?A . Threat PreventionB . DNS SecurityC . WildFireD . URL FilteringView AnswerAnswer: D Explanation:...

September 15, 2024 No Comments READ MORE +

Which characteristic of serverless computing enables developers to quickly deploy application code?

Which characteristic of serverless computing enables developers to quickly deploy application code?A . Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demandB . Uploading the application code itself, without having to provision a full container image or any OS virtual...

September 14, 2024 No Comments READ MORE +

Which IPsec feature allows device traffic to go directly to the Internet?

Which IPsec feature allows device traffic to go directly to the Internet?A . Split tunnelingB . Diffie-Hellman groupsC . Authentication Header (AH)D . IKE Security AssociationView AnswerAnswer: A Explanation: "Or split tunneling can be configured to allow internet traffic from the device to go directly to the internet, while other...

September 14, 2024 No Comments READ MORE +