86.
SaaS is a cloud hosting environment that offers what?
- A.Development options
- B.Testing options
- C.Software hosting
- D.Improved security
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
SaaS, or Software as a Service, is an environment used to host software services offsite and possibly license just what a company needs and only for as long as they need it. |
87.
Which of the following can be used to protect data stored in the cloud?
- A.SSL
- B.Drive encryption
- C.Transport encryption
- D.Harvesting
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Drive encryption or its equivalent would be useful in protecting data stored in the cloud. |
88.
SOAP is used to perform what function?
- A.Transport data
- B.Enable communication between applications
- C.Encrypt information
- D.Wrap data
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
SOAP is used to enable protocol-independent communication between applications. |
89.
Which attack alters data in transit within the cloud?
- A.Packet sniffing
- B.Port scanning
- C.MitM
- D.Encryption
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Man-in-the-middle attacks are effective at altering data in transit between applications and the cloud. |
90.
Altering a checksum of a packet can be used to do what?
- A.Send an RST
- B.Send a URG
- C.Reset a connection
- D.Evade an NIDS
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
If an NIDS is employed within a cloud environment, attacks such as altering checksums of a packet can be used to avoid detection. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40