Question: B. Client D. Server Data owner 15. The cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound
B. Client D. Server Data owner 15. The cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability A. hybrid C. private B. community D. public 16. A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is A Adobe C. malware B. Animoto D. Prezi 17 are used to send large volumes of unwanted e-mail. A. Rootkits C. Downloaders B. Spammer programs D. Auto-rooter is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met. A. logic bomb C. worm B. trapdoor D. Trojan horse attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to 19. The manage such connections. A. DNS amplification attack C. basic flooding attack B. SYN spoofing attack D. poison packet attack 20. TCP uses the to establish a connection. A. zombie C. directed broadcast B. SYN cookie D. three-way handshake 21. A monitors the characteristics of a single host and the events occurring within that host for suspicious activity A. host-based IDS C. network-based IDS B. security intrusion D. intrusion detection 22. Amonitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity B. security intrusion D. intrusion detection A. host-based IDS C. network-based IDS
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
