Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 5 One benefit of virtualizing a server is the creation of a sandbox env

ID: 3606037 • Letter: Q

Question

Question 5

One benefit of virtualizing a server is the creation of a sandbox environment.

True

False

Question 6

What are the five (5) threat mitigation techniques recommended by NIST?

Question 7

A form of malware that is self-propagating malware designed to infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices is called a:

Bot

Worm

Trojan

Virus

Question 8

What is a digital signature and what role does it play in investigating malware attacks?

Question 9

Which of the following is NOT one of the three main types of Access Control policies:

Permission-based

Discretionary

Mandatory

Role-based

Question 10

Which of the following exists when changes to the order of two or more events can cause a change in behavior?

Unvalidated input

Interprocess communication

Insecure file operations

Race conditions

True

False

Explanation / Answer

Question 5 :

1.True

Virtualisation technology is designed not only for server consolidation,It provides us a usefull tools with that anyone can writing and testing a software.Sandbox is one of the testing environment it takes the snapshot of production environment and perform a tesing operations on that data.

Question 6:
NIST recommands the following techniques to reduce the threat effect
Account Management
Access Enforcement
Least Privilege
Auditing and monitoring
Risk Assessment
Identity and Authentication

By using this we can reduce the effect of a threat.

Question 7 :

Bot

Bot is derived from the word "robot" it is an automated process which interacts with services of other networks.


Question 8:

A digital signature is mathematical technique used to validate the the quality of being authentic and integrity of a software,message or a digital doc.

While investigating a walware attack a digital signature intended to solve the problems in digital communication such are tampering and impersonation. In this any malware effected by a sofware which a digital signature creates a one-way hash of the electronic data to be signed.In investigating we examine the effected file for hash to check weather it is from trusted one ot not.


Question 9:

Permission-based access control is not a part in the three main types of access control policies.

Quesion 10 :

Race conditions exists where when changes to the order of two or more events can cause a change in behavior

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote