Ethical Hacking > AQA A/As Level Question Paper > ETHIAL HACKING (All)
A company that utilizes an IaaS service provider has contracted with a vendor to perform a penetration test on its environment. The vendor is able to exploit the virtualization layer and obtain access... to other instances within the cloud provider's environment that do not belong to the company. Which of the following BEST describes this attack? VM escape Directory traversal Buffer overflow Heap spraying Correct Answer: A systems administrator disabled TLS 1.0 and 1.1, as well as RC4, 3DES, and AES-128 ciphers for TLS 1.2, on a web server. A client now reports being unable to access the web server, but the administrator verifies that the server is online, the web service is running, and other users can reach the server as well. Which of the following should the administrator recommend the user do FIRST? Disable antivirus/anti-malware software Turn off the software firewall Establish a VPN tunnel between the computer and the web server Update the web browser to the latest version Correct Answer: Which of the following cloud deployment models allows a company to have full control over its IT infrastructure? Hybrid Private Cloud within a cloud Public Correct Answer: A VDI administrator has received reports of poor application performance. Which of the following should the administrator troubleshoot FIRST? Container resources Server resources Client devices [Show More]
Last updated: 1 year ago
Preview 1 out of 54 pages
Connected school, study & course
About the document
Uploaded On
Aug 05, 2022
Number of pages
54
Written in
This document has been written for:
Uploaded
Aug 05, 2022
Downloads
0
Views
52
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·