A native hypervisor runs:
A native hypervisor runs:A . with extreme demands on network throughputB . only on certain platformsC . within an operating system’s environmentD . directly on the host computer’s hardwareView AnswerAnswer: D Explanation: ● Type 1 (native or bare metal). Runs directly on the host computer’s hardware ● Type 2 (hosted)....
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?A . weaponizationB . reconnaissanceC . exploitationD . deliveryView AnswerAnswer: A Explanation: "Weaponization: Next, attackers determine which methods to use to compromise a target endpoint. They may choose to embed intruder code within seemingly innocuous...
Match the IoT connectivity description with the technology
DRAG DROP Match the IoT connectivity description with the technology. View AnswerAnswer: Explanation: Short-range wireless: ● Adaptive Network Technology+ (ANT+): ANT+ is a proprietary multicast wireless sensor network technology primarily used in personal wearables, such as sports and fitness sensors. ● Bluetooth/Bluetooth Low-Energy (BLE): Bluetooth is a low-power, short-range communications...
Which aspect of a SaaS application requires compliance with local organizational security policies?
Which aspect of a SaaS application requires compliance with local organizational security policies?A . Types of physical storage media usedB . Data-at-rest encryption standardsC . Acceptable use of the SaaS applicationD . Vulnerability scanning and managementView AnswerAnswer: C Explanation: SaaS applications are cloud-based software that users can access from anywhere...
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?A . You may have to use port numbers greater than 1024 for your business-critical applications.B . You may have to open up multiple ports and these ports...
Which subnet does the host 192.168.19.36/27 belong?
Which subnet does the host 192.168.19.36/27 belong?A . 192.168.19.0B . 192.168.19.16C . 192.168.19.64D . 192.168.19.32View AnswerAnswer: B Explanation: To find the subnet that the host 192.168.19.36/27 belongs to, we need to convert the IP address and the subnet mask to binary form and perform a logical AND operation. The /27...
On an endpoint, which method should you use to secure applications against exploits?
On an endpoint, which method should you use to secure applications against exploits?A . endpoint-based firewallB . strong user passwordsC . full-disk encryptionD . software patchesView AnswerAnswer: D Explanation: Software patches are updates that fix bugs, vulnerabilities, or performance issues in applications. Applying software patches regularly is one of the...
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?A . Threat PreventionB . DNS SecurityC . WildFireD . URL FilteringView AnswerAnswer: D Explanation:...
Which characteristic of serverless computing enables developers to quickly deploy application code?
Which characteristic of serverless computing enables developers to quickly deploy application code?A . Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demandB . Uploading the application code itself, without having to provision a full container image or any OS virtual...
Which IPsec feature allows device traffic to go directly to the Internet?
Which IPsec feature allows device traffic to go directly to the Internet?A . Split tunnelingB . Diffie-Hellman groupsC . Authentication Header (AH)D . IKE Security AssociationView AnswerAnswer: A Explanation: "Or split tunneling can be configured to allow internet traffic from the device to go directly to the internet, while other...