Question 11
Code execution environments that run within an operating system. sharing and leveraging resources of that operating system is called :
Question 12
Policy documentation and training is a:
Question 13
Which of the following is NOT a characteristic of cloud computing?
Question 14
In 2015, 4 million records were stolen from telecom company, XYZ ltd, and later this information was used for scam calls to get bank information from the customers of XYZ. Which was of the following protection would have helped in minimising impact of the theft?
Question 15
Which of the following is not one of the categories of risks as defined in, ENISA (European Network and Information Security Agency) document on Security risk and recommendation?