LAPS stands for Local Administrator Password Solution. It is a Microsoft tool that allows administrators to manage the local administrator passwords on domain-joined computers and store them securely in Active Directory
Syslog and SNMP are the two main _______ protocols through which log records are transferred.
B
If an organization has decided to consume PaaS Cloud service model, then identify the organization's
responsibility that they need to look after based on shared responsibility model.
A
Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?
D
Which of the following creates passwords for individual administrator accounts and stores them in
Windows AD?
C
LAPS stands for Local Administrator Password Solution. It is a Microsoft tool that allows administrators to manage the local administrator passwords on domain-joined computers and store them securely in Active Directory
In MacOS, how can the user implement disk encryption?
D
Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:
D
Disaster Recovery is a _________.
C
Disaster Recovery is a Business-centric strategy. It focuses on ensuring that an organization can continue its critical business functions during and after a disaster. This involves planning and implementing processes to recover and restore business operations, minimizing downtime and data loss.
So, the correct answer is D. Business-centric strategy.
The CEO of Max Rager wants to send a confidential message regarding the new formula for its
coveted soft drink, SuperMax, to its manufacturer in Texas. However, he fears the message could be
altered
in
transit. How can he prevent this incident from happening and what element of the message ensures
the success of this method?
A
Which BC/DR activity includes action taken toward resuming all services that are dependent on
business-critical applications?
B
The BC/DR activity that includes action taken toward resuming all services dependent on business-critical applications is Resumption 1 2. This phase focuses on restoring normal operations and ensuring that all critical services are back up and running after a disruption.
So, the correct answer is C. Resumption.
Which subdirectory in /var/log directory stores information related to Apache web server?
B
Which of the following statement holds true in terms of containers?
D
Damian is the chief security officer of Enigma Electronics. To block intruders and prevent any
environmental accidents, he needs to set a two-factor authenticated keypad lock at the entrance, rig
a
fire
suppression system, and link any video cameras at various corridors to view the feeds in the
surveillance room. What layer of network defense-in-depth strategy is he trying to follow?
A
Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the
company can deny getting email notifications or any other communication, she mandates
authentication
before a connection establishment or message transfer occurs. What fundamental attribute of
network defense is she enforcing?
B
Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in
the system, which can be exploited by the attackers. Which among the following is the correct syntax
for
disabling a service?
B
Identify the virtualization level that creates a massive pool of storage areas for different virtual
machines running on the hardware.
B
The virtualization level that creates a massive pool of storage areas for different virtual machines running on the hardware is Fabric virtualization. This level of virtualization makes virtual devices independent of the physical computer hardware and uses technologies like Storage Area Networks (SAN) to achieve this 1 2.
So, the correct answer is A. Fabric virtualization.