Live Virtual Machine Lab 6 Exam Questions
and Answers 100% Pass
In terms of encryption algorithms, what does SHA stand for? - ANS Secure Hashing Algorithm
Which of the following processes or technologies can be used to detect unauthorized changes
to data? - ANS File Integrity Monitoring (FIM)
Which of the following types of hold tag can be applied to a storage device in AWS via an S3
Object Lock?(Choose all that apply). - ANS Retention Hold
Legal Hold
Which of the following descriptions would best apply to a WORM storage device? - ANS A
device that allows data to be written to it, but not altered.
In a Cloud environment, what is the role of CASB services or technologies?(Choose all at apply).
- ANS To assist in the implementation of security policies, procedures, and technologies for
users
To streamline access to secure data for users
To provide visibility into Cloud security
Which of the following type of attack uses HTML tags to identify a possible vulnerability? -
ANS XSS Scripting
1