Which characteristic of serverless computing enables developers to quickly deploy application code?
Which characteristic of serverless computing enables developers to quickly deploy application code?A . Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand B. Uploading the application code itself, without having to provision a full container image or any OS virtual...
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?A . Benign B. Tolerated C. Sanctioned D. SecureView AnswerAnswer: C
Which of the following is a CI/CD platform?
Which of the following is a CI/CD platform?A . Github B. Jira C. Atom.io D. JenkinsView AnswerAnswer: D
Which native Windows application can be used to inspect actions taken at a specific time?
Which native Windows application can be used to inspect actions taken at a specific time?A . Event Viewer B. Timeline inspector C. Task Manager D. Task SchedulerView AnswerAnswer: A
In SecOps, what are two of the components included in the identify stage? (Choose two.)
In SecOps, what are two of the components included in the identify stage? (Choose two.)A . Initial Research B. Change Control C. Content Engineering D. Breach ResponseView AnswerAnswer: A,C
Which network device breaks networks into separate broadcast domains?
Which network device breaks networks into separate broadcast domains?A . Hub B. Layer 2 switch C. Router D. Wireless access pointView AnswerAnswer: C Explanation: A layer 2 switch will break up collision domains but not broadcast domains. To break up broadcast domains you need a Layer 3 switch with vlan...
Which type of LAN technology is being displayed in the diagram?
Which type of LAN technology is being displayed in the diagram? A . Star Topology B. Spine Leaf Topology C. Mesh Topology D. Bus TopologyView AnswerAnswer: A
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?A . DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment B. DevSecOps ensures the pipeline has horizontal intersections for application code deployment C. DevSecOps unites the Security team with the Development and Operations...
Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?
Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?A . Statistical-based B. Knowledge-based C. Behavior-based D. Anomaly-basedView AnswerAnswer: B Explanation: A knowledge-based system uses a database of known vulnerabilities and attack profiles to identify intrusion attempts. These types of systems have lower...
Order the OSI model with Layer7 at the top and Layer1 at the bottom
DRAG DROP Order the OSI model with Layer7 at the top and Layer1 at the bottom. View AnswerAnswer: