Exam (elaborations) ETHICAL HACKING (C170)
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access to other instances within the cloud provider's environment that do not belong to the company. Which of the following BEST describes this attack? VM escape Directory traversal Buffer overflow Heap spraying A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well. Which of the following should the administrator recommend the user do FIRST? Disable antivirus/anti-malware software Turn off the software firewall Establish a VPN tunnel between the computer and the web server Update the web browser to the latest version Correct Answer: Which of the following cloud deployment models allows a company to have full control over its IT infrastructure? Hybrid Private Cloud within a cloud A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST? Container resources Server resources Client devices
Geschreven voor
Documentinformatie
- Geüpload op
- 5 augustus 2022
- Aantal pagina's
- 45
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
a cloud architect wants to minimize the risk of having systems administrators
-
a company has a cloud infrastructure service
-
a systems administrator has migrated an internal application to a public clou
Ook beschikbaar in voordeelbundel