Which of the following Is a resiliency strategy that allows a system to automatically adapt to workload changes?
Which of the following Is a resiliency strategy that allows a system to automatically adapt to workload changes?A . Fault toleranceB . RedundancyC . ElasticityD . High availabilityView AnswerAnswer: C
Which of the following BEST represents what happened?
Staff members of an organization received an email message from the Chief Executive Officer (CEO) asking them for an urgent meeting in the main conference room. When the staff assembled, they learned the message received was not actually from the CEO. Which of the following BEST represents what happened?A ....
Which of the following is the administrator protecting against?
A systems administrator is increasing the security settings on a virtual host to ensure users on one VM cannot access information from another VM. Which of the following is the administrator protecting against?A . VM sprawlB . VM escapeC . VM migrationD . VM sandboxingView AnswerAnswer: B
Which of the following is the BEST example of a reputation impact identified during a risk assessment?
Which of the following is the BEST example of a reputation impact identified during a risk assessment?A . A bad software patch taking down the production systems.B . A misconfigured firewall exposing intellectual properly to the internet.C . An attacker defacing the e-commerce portal.D . Malware collecting credentials for company...
Which of the following would reduce the attack surface added by the service and account?
A systems administrator is installing and configuring an application service that requires access to read and write to log and configuration files on a local hard disk partition. The service must run as an account with authorization to interact with the file system. Which of the following would reduce the...
Which of the following BEST identifies this application attack?
An application developer has neglected to include input validation checks in the design of the company's new web application. An employee discovers that repeatedly submitting large amounts of data, including custom code to an application will allow the execution of the custom code at the administrator level. Which of the...
Which of the following considerations is of MOST concern if the replication technology being used is highly sensitive to network latency?
A company is examining possible locations for a hot site. Which of the following considerations is of MOST concern if the replication technology being used is highly sensitive to network latency?A . Connection to multiple power substationsB . Location proximity to the production siteC . Ability to create separate caged...
Which of the following configurations supports the VLAN definitions?
A technician is implementing 802 1X with dynamic VLAN assignment based on a user Active Directory group membership. Which of the following configurations supports the VLAN definitions?A . RADIUS attributeB . SAML tagC . LDAP pathD . Shibboleth IdPView AnswerAnswer: B
Which of the following secure coding techniques would be MOST useful to avoid this problem?
While testing a new application, a developer discovers that the inclusion of an apostrophe in a username cause the application to crash. Which of the following secure coding techniques would be MOST useful to avoid this problem?A . Input validationB . Code signingC . ObfuscationD . EncryptionView AnswerAnswer: A
Which of the following should the administrator configure?
A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate devices using PKI. Which of the following should the administrator configure?A . A captive portalB . PSKC . 802.1XD . WPSView AnswerAnswer: D