Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?
Correct Answer: D
Explanation The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls. formal declaration by a designated accrediting authority (DAA) or principal accrediting authority (PAA) that an information system is approved to operate at an acceptable level of risk, based on the implementation of an approved set of technical, managerial, and procedural safeguards. See authorization to operate (ATO). Rationale: The Risk Management Framework uses a new term to refer to this concept, and it is called authorization. Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging. Synonymous with Security Perimeter. For the purposes of identifying the Protection Level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system. See authorization boundary. Rationale: The Risk Management Framework uses a new term to refer to the concept of accreditation, and it is called authorization. Extrapolating, the accreditation boundary would then be referred to as the authorization boundary.
Question 77
Which ios jailbreaking technique patches the kernel during the device boot so that it becomes jailbroken after each successive reboot?
Correct Answer: B
A semi-tethered jailbreak is one that allows a handset to finish a boot cycle when being pwned, however jailbreak extensions won't load till a laptop-based jailbreak application is deployed over a physical cable association between the device and also the computer in question. Semi-tethered jailbreaks aren't as difficult as tethered jailbreaks as a result of you'll be able to power cycle your device and expect to use it commonly thenceforth, like creating phone calls and causing text messages. On the opposite hand, jailbreak tweaks won't initialize on the freshly-booted device and jailbreak-based apps like Cydia and Filza can merely crash on launch them till the device is shod back to a jailbroken state. Just as the name implies, a semi-'tethered' jailbreak necessitates a physical cable association between the device and also the laptop once running the jailbreak tool to patch the kernel and reinitialize the jailbroken state, however the nice issue here is that you simply will still access important core smartphone practicality in an exceedingly pinch after you don't have a laptop near . The spic-and-span checkra1n jailbreak tool for macOS (and before long Windows) could be a prime example of a semi-tethered jailbreak, and may pwn A7-A11-equipped devices as previous because the iPhone 5s and as new because the iPhone X.
Question 78
Henry Is a cyber security specialist hired by BlackEye - Cyber security solutions. He was tasked with discovering the operating system (OS) of a host. He used the Unkornscan tool to discover the OS of the target system. As a result, he obtained a TTL value, which Indicates that the target system is running a Windows OS. Identify the TTL value Henry obtained, which indicates that the target OS is Windows.
Correct Answer: C
Question 79
John, a disgruntled ex-employee of an organization, contacted a professional hacker to exploit the organization. In the attack process, the professional hacker Installed a scanner on a machine belonging to one of the vktims and scanned several machines on the same network to Identify vulnerabilities to perform further exploitation. What is the type of vulnerability assessment tool employed by John in the above scenario?
Correct Answer: B
Knowing when to include agents into your vulnerability management processes isn't an easy decision. Below are common use cases for agent-based vulnerability scanning to assist you build out your combined scanning strategy. Intermittent or Irregular Connectivity: Vulnerability management teams are now tasked with scanning devices that access the company network remotely using public or home-based Wi-Fi connections. These connections are often unreliable and intermittent leading to missed network-based scans. Fortunately, the scanning frequency of agents doesn't require a network connection. The agent detects when the device is back online, sending scan data when it's ready to communicate with the VM platform. Connecting Non-Corporate Devices to Corporate Networks:With the increased use of private devices, company networks are more exposed to malware and infections thanks to limited IT and security teams' control and visibility. Agent-based scanning gives security teams insight into weaknesses on non-corporate endpoints, keeping them informed about professional hacker is potential attack vectors in order that they can take appropriate action. Endpoints Residing Outside of Company Networks: Whether company-issued or BYOD, remote assets frequently hook up with the web outside of traditional network bounds. An agent that resides on remote endpoints conducts regular, authenticated scans checking out system changes and unpatched software. The results are then sent back to the VM platform and combined with other scan results for review, prioritization, and mitigation planning. Agent-Based Scanner: Agent-based scanners reside on a single machine but can scan several machines on the same network.
Question 80
Richard, an attacker, targets an MNC. in this process, he uses a footprinting technique to gather as much information as possible. Using this technique, he gathers domain information such as the target domain name, contact details of its owner, expiry date, and creation date. With this information, he creates a map of the organization's network and misleads domain owners with social engineering to obtain internal details of its network. What type of footprinting technique is employed by Richard?
Correct Answer: D
Explanation Email header reveals information about the mail server, original sender's email id, internal IP addressing scheme, also because the possible architecture of the target network. Tracking Email Communications* Email tracking is employed to watch the delivery of emails to an intended recipient.* Attackers track emails to collect information a few target recipient so as to perform social engineering and other attacks.* Get recipient's system IP address* Geolocation of the recipient* When the e-mail was received and skim* Whether or not the recipient visited any links sent to them* Get recipient's browser and OS information* Time spent on reading the emails