A company reduced the area utilized in its data center by creating virtual networking through automation and by creating provisioning routes and rules through scripting. Which of the following does this example describe?
Which of the following best describes a use case for a DNS sinkhole?
A. Attackers can see a DNS sinkhole as a highly valuable resource to identify a company's domain structure. B. A DNS sinkhole can be used to draw employees away from known-good websites to malicious ones owned by the attacker. C. A DNS sinkhole can be used to capture traffic to known-malicious domains used by attackers. D. A DNS sinkhole can be set up to attract potential attackers away from a company's network resources.
During the onboarding process, an employee needs to create a password for an intranet account. The password must include ten characters, numbers, and letters, and two special characters. Once the password is created, the company will grant the employee access to other company-owned websites based on the intranet profile. Which of the following access management concepts is the company most likely using to safeguard intranet accounts and grant access to multiple sites based on a user's intranet account? (Choose two.)
A. Federation B. Identity proofing C. Password complexity D. Default password changes E. Password manager F. Open authentication
An attacker posing as the Chief Executive Officer calls an employee and instructs the employee to buy gift cards. Which of the following techniques is the attacker using?
A. Smishing B. Phishing C. Impersonating D. Vishing
A company requires hard drives to be securely wiped before sending decommissioned systems to recycling.
Which of the following best describes this policy?
A. Enumeration B. Sanitization C. Destruction D. Inventory
After a recent vulnerability scan, a security engineer needs to harden the routers within the corporate network.
Which of the following is the most appropriate to disable?
A. Console access B. Routing protocols C. VLANs D. Web-based administration
Which of the following roles, according to the shared responsibility model, is responsible for securing the company's database in an IaaS model for a cloud environment?
A. Client B. Third-party vendor C. Cloud provider D. OBA
Correct Answer: A
Please disable your adblocker or whitelist this site!