Computer Science, asked by arunimaks96p5w7x4, 1 year ago

Which of the following is/are Gartner’s cloud computing security risks?

(a) Data Location
(b) Long-term Viability
(c) Privileged User Access
(d) Operating System Vulnerability
1 point
In cloud “Recovery Time Objective” ( RTO) depicts:

(a)The period of time allowed for recovery
(b)Percentage of data recovered
(c )Maximum amount of data recovered
(d)None
1 point
Which type(s) of firewall record(s) information about ongoing TCP sessions and ensures out-of-session packets are discarded?

(a) Stateful
(b) Application proxy
(c) Packet filter
(d) None of these
1 point
Which of the following sequence is correct for working of network security?

(a) Reconnaissance, Determine security policy, Determine security policy, Post-attack investigation
(b) Determine security policy, Vulnerability scanning, Post-attack investigation, Reconnaissance
(c) Vulnerability scanning, Determine security policy, Reconnaissance, Post-attack investigation
(d) Determine security policy, Reconnaissance, Vulnerability scanning, Post-attack investigation
1 point
Basic component(s) of cloud security is/are:

(a)Integrity
(b)Availability
(c)Confidentiality
(d)Access Control

Answers

Answered by udhay118
0
the answers are a,b,d,c
Similar questions