Why containers are less secure that virtual machines?
Why containers are less secure that virtual machines?A . Host OS on containers has a larger surface attack.B . Containers may full fill disk space of the host.C . A compromise container may cause a CPU starvation of the host.D . Containers are attached to the same virtual network.View AnswerAnswer:...
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?A . [cache:]B . [site:]C . [inurl:]D . [link:]View AnswerAnswer: B
Cross-site request forgery involves:
Cross-site request forgery involves:A . A request sent by a malicious user from a browser to a serverB . Modification of a request by a proxy between client and serverC . A browser making a request to a server without the user’s knowledgeD . A server making a request to...
In this context, what can you say?
Bob, a system administrator at TPNQM SA, concluded one day that a DMZ is not needed if he properly configures the firewall to allow access just to servers/ports, which can have direct internet access, and block the access to workstations. Bob also concluded that DMZ makes sense just when a...
Which of the following requests best illustrates an attempt to exploit an insecure direct object reference vulnerability?
Insecure direct object reference is a type of vulnerability where the application does not verify if the user is authorized to access the internal object via its name or key. Suppose a malicious user Rob tries to get access to the account of a benign user Ned. Which of the...
Which of the following is the best countermeasure to encrypting ransomwares?
Which of the following is the best countermeasure to encrypting ransomwares?A . Use multiple antivirus softwaresB . Keep some generation of off-line backupC . Analyze the ransomware to get decryption key of encrypted dataD . Pay a ransomView AnswerAnswer: B
Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds.
Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends “many” IP packets, based on the average number of packets sent by all origins and using some thresholds. In concept, the solution developed by Bob is...
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?
Which of the following types of jailbreaking allows user-level access but does not allow iboot-level access?A . Bootrom ExploitB . iBoot ExploitC . Sandbox ExploitD . Userland ExploitView AnswerAnswer: D
Which of the following program infects the system boot sector and the executable files at the same time?
Which of the following program infects the system boot sector and the executable files at the same time?A . Stealth virusB . Polymorphic virusC . Macro virusD . Multipartite VirusView AnswerAnswer: D
How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?
How is the public key distributed in an orderly, controlled fashion so that the users can be sure of the sender’s identity?A . Hash valueB . Private keyC . Digital signatureD . Digital certificateView AnswerAnswer: D