Created by - Mary Smith
Questions 1. A mobile phone has started to respond slowly and erratically. The user has done a soft reset and the problem still exists. Which of the following is the BEST step the user can take to fix this problem?A) A. Perform a force stopB) B. Reset to factory defaultC) C. Upgrade to a larger batteryD) D. Close running apps2. A newly deployed Windows PC cannot connect to the antivirus server on the local network for updates, but it can connect to other file servers and printers without issue. Which of the following is the MOST likely cause of this issue?A) A. The PC-s Windows firewall is misconfiguredB) B. The PC has an incorrect IP address configuredC) C. The PC is on the wrong wireless networkD) D. The PC does not have remote assistance turned on3. A technician is attempting to manually migrate a user-s profile from one Windows PC to another. Files in the user-s My Documents folder cannot be copied. Some files in question have green letters in the filenames. Which of the following file systems is causing this to occur?A) A. exFATB) B. COMPRESSEDC) C. EFSD) D. NTFS4. Ann, a user, has a phablet for personal and work usage. She finds that her phablet starts to exhibit slow performance after a couple of hours and that the problem worsens as the day goes by. If Ann restarts the device, it works fine for a couple of hours and then starts to run slow again. Which of the following is the BEST action to troubleshoot this problem?A) A. Check running appsB) B. Reset to factory defaultC) C. Disable cloud syncingD) D. Replace the device-s battery5. A new help desk technician receives a trouble call from a user. The issue is something the technician has never encountered before, and does not know where to begin troubleshooting. The FIRST course of action is for the technician to:A) A. tell the customer the issue needs to be escalated to a higher tier technician.B) B. ask the customer if they would mind holding for no more than two minutes to check resources.C) C. tell the customer this is the first time encountering the issue and to please be patient.D) D. ask the customer to please hold while a senior technician is consulted regarding the issue. Right Answer and Explanation: 1. Right Answer: BExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: AExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. What is the purpose of the file /etc/profile?A) A. It contains the welcome message that is displayed after login.B) B. It contains security profiles defining which users are allowed to log in.C) C. It contains environment variables that are set when a user logs in.D) D. It contains default application profiles for users that run an application for the first time.2. Which of the following are requirements in order to run a shell script like a regular command from anywhere in the filesystem? (Choose THREE correct answers.)(Select 3answers)A) A. The user issuing the command must be in the group script.B) B. The script file must be found in the $PATH.C) C. The script file must have the executable permission bit set.D) D. The script must begin with a shebang-line (#!) that points to the correct interpreter.E) E. The file system on which the script resides must be mounted with the option scripts.3. Which file used by XDM specifies the default wallpaper?A) A. /etc/X11/xdm/XsetupB) B. /etc/X11/xdm.confC) C. /etc/X11/xdm/DefaultsD) D. /etc/X11/defaults.conf4. The X11 configuration file xorg.conf is grouped into sections. How is the content of the section SectionName associated with that section?A) A. It is placed in curly brackets as in Section SectionName { ... }.B) B. It is placed between a line containing Section 'SectionName' and a line containing EndSection.C) C. It is placed between the tags and D) D. It is placed after the row [SectionName].E) E. It is placed after an initial unindented Section 'SectionName' and must be indented by exactly one tab character.5. What is the purpose of a screen reader?A) A. It reads text displayed on the screen to blind or visually impaired people.B) B. It reads the parameters of the attached monitors and creates an appropriate X11 configuration.C) C. It displays lines and markers to help people use speed reading techniques.D) D. It manages and displays files that contain e-books. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: B,C,DExplanation: 3. Right Answer: AExplanation: 4. Right Answer: BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An organization wants to implement a solution that allows for automated logical controls for network defense. An engineer plans to select an appropriate network security component,which automates response actions based on security threats to the network. Which of the following would be MOST appropriate based on the engineer - s requirements?A) NIPSB) HIDSC) Web proxyD) Elastic load balancerE) NAC2. An organization wants to utilize a common,Internet-based third-party provider for authorization and authentication. The provider uses a technology based on OAuth 2.0 to provide required services. To which of the following technologies is the provider referring?A) Open ID ConnectB) SAMLC) XACMLD) LDAP3. A number of employees report that parts of an ERP application are not working. The systems administrator reviews the following information from one of the employee workstations: Execute permission denied: financemodule.dll Execute permission denied: generalledger.dll Which of the following should the administrator implement to BEST resolve this issue while minimizing risk and attack exposure?A) Update the application blacklistB) Verify the DLL - s file integrityC) Whitelist the affected librariesD) Place the affected employees in the local administrator - s group4. A penetration tester finds that a company - s login credentials for the email client were being sent in clear text. Which of the following should be done to provide encrypted logins to the email server?A) Enable IPSec and configure SMTP.B) Enable SSH and LDAP credentials.C) Enable MIME services and POP3.D) Enable an SSL certificate for IMAP services.5. A penetration tester has written an application that performs a bit-by-bit XOR 0xFF operation on binaries prior to transmission over untrusted media. Which of the following BEST describes the action performed by this type of application?A) HashingB) Key exchangeC) EncryptionD) Obfusication Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following functions can be used to calculate the sum of a range of cells based on multiple criteria?A) COUNTIFB) SUMIFC) COUNTIFSD) SUMIFS2. Pivot tables can be used to:A) Analyze large sets of dataB) Perform mathematical calculations on dataC) Sort and filter dataD) All of the above3. Which of the following Excel features allows you to create a custom number format?A) Custom ListsB) AutoFillC) Format CellsD) Conditional Formatting4. Which of the following Excel features allows you to validate data based on a set of rules?A) Validation RulesB) Scenario ManagerC) Data TablesD) Solver5. Which of the following is NOT a type of pivot table layout in Excel?A) MatrixB) CompactC) TabularD) Outline Right Answer and Explanation: 1. Right Answer: DExplanation: The SUMIFS function can be used to calculate the sum of a range of cells based on multiple criteria.2. Right Answer: DExplanation: Pivot tables can be used to analyze large sets of data, sort and filter data, and perform mathematical calculations on data.3. Right Answer: CExplanation: The Format Cells feature in Excel allows you to create a custom number format.4. Right Answer: AExplanation: Validation Rules in Excel allow you to validate data based on a set of rules.5. Right Answer: AExplanation: Matrix is not a type of pivot table layout in excel .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following responses to risk best describes the evolving concept of flexibility in supply chain risk management?A) The practice of adjusting capacities in a manufacturing environmentB) The ability to react quickly to changes or events while maintaining customer service levelsC) The ability to produce high volume stock keeping units (SKUs) in multiple locationsD) The ability to produce complex configurations of a product within the standard lad time2. Which of the following principles is included in the United Nations (UN) Global Compact?A) Trading blocsB) Anti-corruptionC) Risk managementD) Accounting standards3. Which of the following types of risk typically would be most difficult to plan for and mitigate?A) Currency fluctuationB) Forecast errorC) GeopoliticalD) Supplier performance4. Due diligence for conflict- or high-risk-materials should include which of the following processes:A) a method to track the country of origin of materials when they leave the country.B) a system of controls and transparency regarding the traceability of materials through the supply chain.C) certification primarily by companies that are selling directly to consumers about the firm×?â?¬â?¢s tier one suppliers.D) ability to provide documentation of the source materials when they are imported into United Nations countries.5. The Delphi forecasting method offers which of the following advantages?A) It is based on widely used statistical formulas.B) It compensates for the individual biases of the participants.C) It assigns more weight to the demand from key customers.D) It reduces the risk that a few individuals will dominate the process. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: BExplanation: Reference:https://www.unglobalcompact.org/what-is-gc/mission/principles3. Right Answer: CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: DExplanation: Reference:https://s4be.cochrane.org/blog/2017/11/15/the-delphi-technique/ .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An engineer must configure a secure SIP trunk with a remote provider, with a specific requirement to use port 5065 for inbound and otubound traffic. Which two items must be configured to complete this configuration? (Choose two.)(Select 2answers)A) Incoming Port in SIP Information section of the SIP Trunk configurationB) Incoming Port in Security Information of the SIP Profile configurationC) Incoming Port in SIP Trunk Security Profile configurationD) Destination Port in SIP Information section of the SIP Trunk configuration2. How does an engineer globalize routing for ingress calls coming from the PSTN to internal DNs?A) At Cisco Unified CM, put the calling number in E.164 format and the called number in PSTN formatB) At the PSTN gateway, put the calling number in PSTN format and the called number in DN formatC) At the PSTN gateway, put the calling number in E.164 format and the called number in localized (DN) formatD) 3. If all patterns below are configured in Cisco Unified Communications Manager which would be used when dialing the pattern â??123â??A) 12!B) 1XX (urgent Priority Set)C) 12X (urgent priority set)D) 4. Which configuration element of a hunt group allows for changing Calling Party Transformations settings?A) hunt listB) route groupC) line groupD) hunt pilot5. Where on Cisco Unified Communications Manager do you configure the standard local route group for a group of devices?A) System > Location InfoB) Call Routing > Emergency Location > Emergency Location (ELIN) GroupsC) System > Device PoolD) Call Routing > Route/Hunt > Local Route Group Names Right Answer and Explanation: 1. Right Answer: C,DExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: DExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. You are trying to send packets from an EC2 Instance to an on-premise server. The transmission is happening over the Internet. You have set Jumbo frames due to the size of the packets being sent. But the packets are being dropped. What needs to be done to ensure that the packets don?t get dropped?A) Ensure that the MTU is set to 9001B) Ensure that the ?Do Not Fragment? flag is set In the lP headerC) Ensure that the ?Do Not Fragment? flag is not set in the IP headerD) Enable Enhanced Networking on the Instance2. You have two Direct Connect connections and two VPN connections to your network. Following are the details Site A is VPN 10.2.0.0/24 AS 65000 Site B is VPN 10.2.0.252/30 AS 65000 Site C is DX 10.0.0.0/8 AS 65000 65000 Site D is DX 10.0.0.0/16 AS 65000 65000 Which site will AWS(Amazon Web Service) choose to reach your network?A) Site BB) Site DC) Site AD) Site C3. Your company is using a hosted virtual interface from its parent AWS(Amazon Web Service) Account. You need to mention to IT management on what charges your company will acquire. Which of the following would you mention?A) The amount of hours used by the interfaceB) The port hour chargesC) The data transfer out via the interfaceD) The data transfer in4. The company has a number of EC2 instances defined by VPC. They need to follow the traffic flow instances. They also have to keep track of all API occurring EC2 instances Which of the following services can help meet this requirement?A) AWS AWS(Amazon Web Service) Cloud Trail and ConfigB) AWS Cloud Trail and VPC Flow LogsC) AWS Cloud Trail Cloud Watch and logsD) NoneE) Amazon Cloud Watch Logs and VPC Flow Logs5. The company currently has a number of EC2 instances hosted by VPC. IT Security department to suspect a possible DDOS attack cases, What do you do to apply for IP addresses that will receive a flurry of requests.A) Use the AWS(Amazon Web Service) Config get the PP addresses EC2 InstancesB) Use the VPC Flow logs to get PP addresses EC2 InstancesC) Use the AWS(Amazon Web Service) Trusted Advisor to get PP addresses EC2 InstancesD) Use the AWS(Amazon Web Service) Cloud trail to get to the PP addresses EC2 InstancesE) None Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: AExplanation: 3. Right Answer: CExplanation: 4. Right Answer: BExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which AWS security service protects applications from distributed denial of service attacks with always-ondetection and automatic inline mitigations?A) A. Amazon InspectorB) B. AWS Web Application Firewall (AWS WAF)C) C. Elastic Load Balancing (ELB)D) D. AWS Shield2. A company wants to monitor the CPU usage of its Amazon EC2 resources.Which AWS service should the company use?A) A. AWS CloudTrailB) B. Amazon CloudWatchC) C. AWS Cost and Usage reportD) D. Amazon Simple Notification Service (Amazon SNS)3. What is an AWS Identity and Access Management (IAM) role?A) A. A user associated with an AWS resourceB) B. A group associated with an AWS resourceC) C. An entity that defines a set of permissions for use with an AWS resourceD) D. An authentication credential associated with a multi-factor authentication (MFA) token4. What are the advantages of Reserved Instances? (Choose two.)(Select 2answers)A) A. They provide a discount over on-demand pricing.B) B. They provide access to additional instance types.C) C. They provide additional networking capability.D) D. Customers can upgrade instances as new types become available.E) E. Customers can reserve capacity in an Availability Zone.5. How do Amazon EC2 Auto Scaling groups help achieve high availability for a web application?A) A. They automatically add more instances across multiple AWS Regions based on global demand of theapplication.B) B. They automatically add or replace instances across multiple Availability Zones when the application needsit.C) C. They enable the application's static content to reside closer to end users.D) D. They are able to distribute incoming requests across a tier of web server instances. Right Answer and Explanation: 1. Right Answer: DExplanation: AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applicationsrunning on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimizeapplication downtime and latency, so there is no need to engage AWS Support to benefit from DDoSprotection. There are two tiers of AWS Shield - Standard and Advanced.https://aws.amazon.com/shield/2. Right Answer: BExplanation: With Basic monitoring you get data on your cloudwatch metrics every 5 minutes. Enabling detailed monitoring,you will get the data every one minute.To check if detailed monitoring is enabled, on your EC2 Console, Select the instance, on the lower plane,Select Monitoring.https://forums.aws.amazon.com/thread.jspa?threadID=2638763. Right Answer: CExplanation: AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resourcessecurely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow anddeny their access to AWS resources.https://aws.amazon.com/iam/4. Right Answer: A,EExplanation: https://aws.amazon.com/premiumsupport/knowledge-center/ec2-ri-basics/5. Right Answer: BExplanation: When the unhealthy Availability Zone returns to a healthy state, Auto Scaling automatically redistributes theapplication instances evenly across all of the designated Availability Zones.https://docs.aws.amazon.com/autoscaling/ec2/userguide/auto-scaling-benefits.html .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. You have a 2 tier application hosted in AWS. It consists of a web server and database server (SQL Server) hosted on separate EC2 Instances. You are devising the security groups for these EC2 Instances. The Web tier needs to be accessed by users across the Internet. You have created a web security group(wg-123) and database security group(db-345). Which combination of the following security group rules will allow the application to be secure and functional. Choose 2 answers from the options given below.(Select 2answers)A) db-345 - Allow port 1433 from wg-123B) wg-123 - Allow ports 80 and 443 from 0.0.0.0/0C) db-345 - Allow ports 1433 from 0.0.0.0/0 (Incorrect)D) wg-123 - Allow port 1433 from wg-1232. You have a 2 tier application hosted in AWS. It consists of a web server and database server (SQL Server) hosted on separate EC2 Instances. You are devising the security groups for these EC2 Instances. The Web tier needs to be accessed by users across the Internet. You have created a web security group(wg-123) and database security group(db-345). Which combination of the following security group rules will allow the application to be secure and functional. Choose 2 answers from the options given below.(Select 2answers)A) wg-123 - Allow ports 80 and 443 from 0.0.0.0/0B) wg-123 - Allow port 1433 from wg-123C) db-345 - Allow ports 1433 from 0.0.0.0/0 (Incorrect)D) db-345 - Allow port 1433 from wg-1233. Your IT Security team has advised to carry out a penetration test on the resources in their company's AWS(Amazon Web Service) Account. This is as part of their capability to analyze the security of the Infrastructure. What should be done first in this regard?A) Submit a request to AWS(Amazon Web Service) SupportB) Turn on VPC Flow Logs and carry out the penetration testC) Use a custom AWS(Amazon Web Service) Marketplace solution for conducting the penetration test (Incorrect)D) Turn on Cloud trail and carry out the penetration test4. You have just received an email from AWS(Amazon Web Service) Support stating that your AWS(Amazon Web Service) account might have been compromised. Which of the following steps would you look to carry out immediately. Choose 3 answers from the options below.(Select 3answers)A) Rotate all IAM access keysB) Change the root account password.C) Keep all resources running to avoid disruptionD) Change the password for all IAM users.5. A company is using Cloud Trail to log all AWS(Amazon Web Service) API activity for all regions in all of its accounts. The CISO has asked that additional steps be taken to protect the Integrity of the log files. What combination of steps will protect the log files from intentional or unintentional alteration? Choose 2 answers from the options given below Please select?(Select 2answers)A) Create a Security Group that blocks all traffic except calls from the Cloud Trail service. Associate the security group with all the Cloud Trail destination S3 buckets.B) Write a Lambda function that queries the Trusted Advisor Cloud Trail checks. Run the function every 10 minutes.C) Create an S3 bucket In a dedicated log account and grant the other accounts write only access. Deliver all log files from every account t this S3 bucket.D) Enable Cloud Trail log file integrity validation ,E) Use Systems Manager Configuration Compliance to continually monitor the access policies of S3 buckets containing Cloud Trail logs. Right Answer and Explanation: 1. Right Answer: A,BExplanation: The Web security groups should allow access for ports 80 and 443 for HTTP and HTTPS traffic to all users from the internet. The database security group should just allow access from the web security group from port 1433. Option C is invalid because this is not a valid configuration Option D is invalid because database security should not be allowed on the internet For more information on Security Groups please visit the below URL https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html2. Right Answer: A,DExplanation: The Web security groups should allow access for ports 80 and 443 for HTTP and HTTPS traffic to all users from the internet. The database security group should just allow access from the web security group from port 1433. Option C is invalid because this is not a valid configuration Option D is invalid because database security should not be allowed on the internet For more information on Security Groups please visit the below URL https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html3. Right Answer: AExplanation: This concept is given in the AWS(Amazon Web Service) Documentation Option A,B and D are all invalid because the first step is to get prior authorization from AWS(Amazon Web Service) for penetration tests For more information on penetration testing, please visit the below URL https://aws.amazon.com/security/penetration-testing/4. Right Answer: A,B,DExplanation: One of the articles from AWS(Amazon Web Service) mentions what should be done in such a scenario If you suspect that your account has been compromised, or if you have received a notification from AWS(Amazon Web Service) that the account has been compromised, perform the following tasks: Change your AWS(Amazon Web Service) root account password and the passwords of any IAM users. Delete or rotate all root and AWS(Amazon Web Service) Identity and Access Management (IAM) access keys. Delete any resources on your account you didn't create, especially running EC2 instances, EC2 spot bids, or IAM users. Respond to any notifications you received from AWS(Amazon Web Service) Support through the AWS(Amazon Web Service) Support Center. Option C is invalid because there could be compromised instances or resources running on your environment. They should be shutdown or stopped immediately. For more information on the article, please visit the below URL https://aws.amazon.com/premiumsupport/knowledge-center/potential-account-compromise/5. Right Answer: C,DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review