Syslog and SNMP are the two main _______ protocols through which log records are transferred.
If an organization has decided to consume PaaS Cloud service model, then identify the organization's
responsibility that they need to look after based on shared responsibility model.
Which of the following is NOT an AWS Shared Responsibility Model devised by AWS?
Which of the following creates passwords for individual administrator accounts and stores them in
In MacOS, how can the user implement disk encryption?
Phishing-like attempts that present users a fake usage bill of the cloud provider is an example of a:
Disaster Recovery is a _________.
The CEO of Max Rager wants to send a confidential message regarding the new formula for its
coveted soft drink, SuperMax, to its manufacturer in Texas. However, he fears the message could be
transit. How can he prevent this incident from happening and what element of the message ensures
the success of this method?
Which BC/DR activity includes action taken toward resuming all services that are dependent on
Which subdirectory in /var/log directory stores information related to Apache web server?
Which of the following statement holds true in terms of containers?
Damian is the chief security officer of Enigma Electronics. To block intruders and prevent any
environmental accidents, he needs to set a two-factor authenticated keypad lock at the entrance, rig
suppression system, and link any video cameras at various corridors to view the feeds in the
surveillance room. What layer of network defense-in-depth strategy is he trying to follow?
Simran is a network administrator at a start-up called Revolution. To ensure that neither party in the
company can deny getting email notifications or any other communication, she mandates
before a connection establishment or message transfer occurs. What fundamental attribute of
network defense is she enforcing?
Steven is a Linux system administrator at an IT company. He wants to disable unnecessary services in
the system, which can be exploited by the attackers. Which among the following is the correct syntax
disabling a service?
Identify the virtualization level that creates a massive pool of storage areas for different virtual
machines running on the hardware.