Q: Which of these would you consider high-value targets for a potential attacker? Check all that apply. or Q: Which of these do you think a prospective attacker would see as high-value targets? Verify anything that pertains. Authentication databases Customer credit card information Logging server Networked printers Explanation: Targets with high potential value for prospective attackers include confidentiality (given that they…
-
-
What’s the purpose of a vulnerability scanner?
Q: What’s the purpose of a vulnerability scanner? or Q: What does a vulnerability scanner do? Answers It protects your network from malware. It blocks malicious traffic from entering your network. It detects vulnerabilities on your network and systems. It fixes vulnerabilities on systems. Explanation: A vulnerability scanner functions very similarly to a security investigator for your computer system. It is…
-
What’s a privacy policy designed to guard against?
Q: What’s a privacy policy designed to guard against? or Q: What does a privacy policy aim to prevent? Eavesdropping on communications Misuse or abuse of sensitive data Attackers stealing customer data Denial-of-service attacks Explanation: A privacy policy acts in a similar capacity to a watchdog for individual data. Its purpose is to prevent unauthorized access, misuse, disclosure, and any other…
-
What is the goal of mandatory IT security training for an organization? Check all that apply.
Q: What is the goal of mandatory IT security training for an organization? Check all that apply. or Q: What is the purpose of an organization’s required IT security training? Verify anything that pertains. To punish employees with poor security practices To educate employees on how to stay secure To build a culture that prioritizes security To avoid the need…
-
Which of the following are necessary in the organization to create a culture that makes security a priority? Select all that apply.
Q: Which of the following are necessary in the organization to create a culture that makes security a priority? Select all that apply. or Q: To establish an organizational culture where security is a top concern, which of the following is required? Choose every option that pertains. Reinforce and reward behaviors that boost the security of the organization A working…
-
What is an example of rehosting an application?
Q: What is an example of rehosting an application? or Q: How would one go about rehosting an application? Before moving an application to the cloud, the application is rewritten in a new programing language. During a migration, older applications are discovered. They are no longer needed and can be turned off. A containerized application can be moved from on-premises…
-
What does AWS Prescriptive Guidance provide to customers?
Q: What does AWS Prescriptive Guidance provide to customers? or Q: What services does AWS Prescriptive Guidance provide its clients? A fully automated migration tool Strategies, methodologies, and frameworks for cloud migration and modernization Direct access to the AWS Migration team A single location to inventory assets and track migration of applications Explanation: Customers are provided with precise guidelines and best…
-
Which of the following is a stage in the assessing process?
Q: Which of the following is a stage in the assessing process? or Q: Which of these describes a step in the evaluation procedure? Rebuild Foundation Re-evaluation Mitigation Explanation: During this step, you will be responsible for assessing the possible dangers that are connected to the system, project, or process. Among its components is the identification and evaluation of potential threats…
-
What does AWS Migration Hub provide?
Q: What does AWS Migration Hub provide? or Q: And what does the AWS Migration Hub offer? A single place to track migrations A single place to build AWS CloudFormation templates A bucket for AWS CloudTrail logs A single place to manage Amazon CloudWatch metrics Explanation: AWS Migration Hub is a service that offers a centralized place for planning, tracking, and…
-
What is a requirement for doing an agentless installation of the AWS Application Discovery Service Agent?
Q: What is a requirement for doing an agentless installation of the AWS Application Discovery Service Agent? or Q: How does one go about installing the AWS Application Discovery Service Agent agentless? Using VMware vCenter Using Lambda functions Using serverless servers on premises Using Amazon Elastic Compute Cloud (Amazon EC2) instances Explanation: The most important prerequisite for an agentless installation of…