Question 5 One benefit of virtualizing a server is the creation of a sandbox env
ID: 3606037 • Letter: Q
Question
Question 5
One benefit of virtualizing a server is the creation of a sandbox environment.
True
False
Question 6
What are the five (5) threat mitigation techniques recommended by NIST?
Question 7
A form of malware that is self-propagating malware designed to infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices is called a:
Bot
Worm
Trojan
Virus
Question 8
What is a digital signature and what role does it play in investigating malware attacks?
Question 9
Which of the following is NOT one of the three main types of Access Control policies:
Permission-based
Discretionary
Mandatory
Role-based
Question 10
Which of the following exists when changes to the order of two or more events can cause a change in behavior?
Unvalidated input
Interprocess communication
Insecure file operations
Race conditions
True
False
Explanation / Answer
Question 5 :
1.True
Virtualisation technology is designed not only for server consolidation,It provides us a usefull tools with that anyone can writing and testing a software.Sandbox is one of the testing environment it takes the snapshot of production environment and perform a tesing operations on that data.
Question 6:
NIST recommands the following techniques to reduce the threat effect
Account Management
Access Enforcement
Least Privilege
Auditing and monitoring
Risk Assessment
Identity and Authentication
By using this we can reduce the effect of a threat.
Question 7 :
Bot
Bot is derived from the word "robot" it is an automated process which interacts with services of other networks.
Question 8:
A digital signature is mathematical technique used to validate the the quality of being authentic and integrity of a software,message or a digital doc.
While investigating a walware attack a digital signature intended to solve the problems in digital communication such are tampering and impersonation. In this any malware effected by a sofware which a digital signature creates a one-way hash of the electronic data to be signed.In investigating we examine the effected file for hash to check weather it is from trusted one ot not.
Question 9:
Permission-based access control is not a part in the three main types of access control policies.
Quesion 10 :
Race conditions exists where when changes to the order of two or more events can cause a change in behavior
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.