Question 11

Code execution environments that run within an operating system. sharing and leveraging resources of that operating system is called :
  • Question 12

    Policy documentation and training is a:
  • Question 13

    Which of the following is NOT a characteristic of cloud computing?
  • Question 14

    In 2015, 4 million records were stolen from telecom company, XYZ ltd, and later this information was used for scam calls to get bank information from the customers of XYZ. Which was of the following protection would have helped in minimising impact of the theft?
  • Question 15

    Which of the following is not one of the categories of risks as defined in, ENISA (European Network and Information Security Agency) document on Security risk and recommendation?