Which type of cloud computing service provides access to email and word processing applications running in a cloud infrastructure?
Answer : A
What is the result of deploying virtualization in your data center?
Answer : B
Which two remote access methods are secure because they encrypt traffic? (Choose two.)
Answer : BC
Which action must be taken prior to a successful ransomware attack to enable recovery from the attack?
Answer : B
Which network security architecture feature is designed to purposely expose some of an organization"™s services to untrusted networks?
Answer : C
Which type of cloud computing deployment is available to any person or organization who can pay the usage fees?
Answer : A
DRAG DROP -
Match the attack definition to the type of security method used to protect against the attack.
Select and Place:
Answer :
What is an effective defense against a denial-of-service attack?
Answer : C
DRAG DROP -
Match each cryptographic method with its description.
Select and Place:
Answer :
DRAG DROP -
Match the network infrastructure item with its corresponding description.
Select and Place:
Answer :
Which component of a digital certificate provides authentication of the certificate"™s issuer?
Answer : A
In PKI, which item is issued by a CA?
Answer : A
Which type of adversary would execute a website defacement attack to promote a political agenda?
Answer : B
DRAG DROP -
Match each set of terms to their associated security layer.
Select and Place:
Answer :