Which of the following techniques protects sensitive data by obscuring specific areas with random
characters or codes?
Which of the following objects of the container network model (CNM) contains the configuration files of a container's network stack, such as routing table, container's interfaces, and DNS settings?
Below are various authentication techniques.
1.Retina scanner
2.One-time password
3.DNA
4.Voice recognition
Identify the techniques that fall under biometric authentication.
Which of the following ISO standards provides guidance to ensure that cloud service providers offer appropriate information security controls to protect the privacy of their customer's clients by securing personally identifiable information entrusted to them?
Which of the following practices helps security professionals protect mobile applications from various attacks?
Which of the following access control models refers to assigning permissions to a user role based on the rules defined for each user role by the administrator?
Which of the following solutions is a software or a hardware device on a network or host that filters the incoming and outgoing traffic to prevent unauthorized access to private networks?
John has recently joined an organization and completed his security training. The organization conducted a security campaign on their employees by sending a fake email stating the urgency of password reset. John identified that it was an illegitimate mail and reported it as spam.
Identify the type of attack initiated by the organization as part of the security campaign discussed in the above scenario.
Kelly, a cloud administrator at TechSol Inc., was instructed to select a cloud deployment model to secure the corporate data and retain full control over the data.
Which of the following cloud deployment models helps Kelly in the above scenario?
Alice purchased a new zip-based document bag and placed white papers related to the academic project.
As it contains confidential information, she locked it with a physical security control that requires a
sequence of numbers and letters to unlock.
Identify the type of physical locking system used by Alice in the above scenario.