__________ security consultants uses database security monitoring & scanning
tools to maintain security to different data residing in the database / servers / cloud.
a) Database
b) Network
c) System
d) Hardware

1 Answer

Answer :

d) Hardware

Related questions

Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management

Last Answer : Load Balancing

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : Network Testing and port scanning tools are : a. Sam Spade b. SuperScan c. NetScan d. All of the above

Last Answer : d. All of the above

Description : What are two common concerns in a cloud environment? A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access to private ... in the cloud. D. Running out of storage space and network bandwidth at peak usage times.

Last Answer : Illegal access to private data stored by applications in the cloud.

Description : When you deploy an application on Google’s PaaS App Engine cloud service, the Administration Console provides you with the which of the following monitoring capabilities? a) View data and error logs b) Analyze your network traffic c) View the application’s scheduled tasks d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : _____________ consists of servers, storage devices, network, cloud management software, deployment software, and platform virtualization. A. Computing Planning B. Cloud infrastructure C. Cloud Computing Technologies D. Cloud Computing Architecture

Last Answer : Cloud infrastructure

Description : Which function is not performed by servers: a) Database Sharing b) Storage c) Word Processing d) None of These

Last Answer : c) Word Processing

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : This first step inthe transaction processing cycle captures businessdata throughvarious modes suchas optical scanning orat an electronic commerce website– (A) Document and report generation (B) Database maintenance (C) Transaction processing startup (D) Data Entry

Last Answer : Data Entry

Description : Information needed to develop, use or maintain computer hardware and software and to permit access and retrieval of data is known as: a) Software b) Documentation c) Operation of Hardware d) None of These

Last Answer : b) Documentation

Description : Point out the wrong statement. a) Cloudkick's Insight module is powerful and particularly easy to use CSE-R17.BLOGSPOT.COM b) Both Cloudkick and RightScale are knownto be easy to use with ... with Linux instances c) All of the service models support monitoring solutions d) All of the mentioned

Last Answer : Both Cloudkick and RightScale are known

Description : The sensed data communicated ___________________. A. Cloud-based servers/storage. B. I/O interfaces. C. Internet connectivity. D. None of the above

Last Answer : A. Cloud-based servers/storage. 

Description : anyone who uses a vehicle in texas while residing or working in the state for more than -General Knowledge

Last Answer : Anyone who uses a vehicle in Texas while residing or working in the state for more than 30 days must register their vehicle(s).

Description : Security tools that are widely used are : a. Nmap b. WebInspect c. Network Strumbler d. All of the above

Last Answer : d. All of the above

Description : Security tools that are widely used are : a. Nmap b. WebInspect c. Network Strumbler d. All of the above

Last Answer : Security tools that are widely used are : a. Nmap b. WebInspect c. Network Strumbler d. All of the above

Description : Which of the following statements about Google App Engine (GAE) is INCORRECT. A. It's a Platform as a Service (PaaS) model. B. Automatic Scalability is built in with GAE. As ... s applications. So, applications can take advantage of reliability, performance and security of Google's infrastructure.

Last Answer : You can decide on how many physical servers required for hosting your application.

Description : The DBMS utility, ...................... allows to reconstruct the correct state of database from the backup and history of transactions. A) Backup B) Recovery C) Monitoring D) Data loading

Last Answer : B) Recovery

Description : A ……………… allows to make copies of the database periodically to help in the cases of crashes & disasters. A) Recovery utility B) Backup Utility C) Monitoring utility

Last Answer : B) Backup Utility

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : In Computer Networking, HTTP is referred to as a stateless protocol as servers do not maintain any information about past client requests. HTTP is an acronym for (A) Hyper Text Translation ... ) Hyper Text Transfer Protocol (C) High TeraByte Transfer Protocol (D) Hypervisor Test Translation Protocol

Last Answer : (B) Hyper Text Transfer Protocol

Description : Which of the following used for the Network Testing and port scanning A)NetCat B)SuperScan C)NetScan D)All of Above

Last Answer : D)All of Above

Description : Which of the following is not a network testing and port scanning tool? a. Nmap b. SuperScan c. John the ripper d. NetCat

Last Answer : c. John the ripper

Description : Which of the following used for the Network Testing and port scanning A)NetCat B)SuperScan C)NetScan D)All of Above

Last Answer : D)All of Above

Description : Geographic distribution of data across a cloud provider'’ network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : Geographic distribution of data across a cloud provider’s network is a problem for many enterprises because it: A. Breaks compliance regulations B. Adds latency C. Raises security concerns D. Makes data recovery harder

Last Answer : Breaks compliance regulations

Description : In IT, means that the data available in the database is both accurate and consistent. (1) Data Security (2) Data Availability (3) Data Binding (4) Data Integrity

Last Answer : Data Integrity

Description : Which of the following tools is used for Networks Testing and port Scanning a) NetCat b) SuperScan c) NetScan d) All of Above

Last Answer : d) All of Above

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1) Input automation 2) Item data automation 3) Scanning automation 4) Source data automation

Last Answer : 3) Scanning automation

Description : A sales clerk at a checkout counter scanning a tag on an item rather than keying it into the system, is using - 1 Input automation 2 Item data automation 3 Scanning automation 4 Source data automation

Last Answer : 3 Scanning automation

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : What is the name of Rackspace’s cloud service? A. Cloud On-Demand B. Cloud Servers C. EC2

Last Answer : Cloud Servers

Description : What is the name of Rackspace’s cloud service? A. Cloud On-DemandB. Cloud Servers C. EC2

Last Answer : Cloud Servers

Description : What is the name of the Rackspace cloud service? A. Cloud On-Demand. B. Cloud Servers. C. EC2. D. SimpleDB.

Last Answer : Cloud Servers.

Description : Which statement is true about a cloud computing environment? A. It cannot be used to host location based applications. B. It enables users to access systems regardless of their location. C. It introduces ... D. It can improve a web server response time by having servers closer to the end user.

Last Answer : It enables users to access systems regardless of their location.

Description : Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : .Which of the following feature make cloud-based storage systems highly reliable? a) Redundant networks b) Redundant name servers c) Replication d) All of the mentioned

Last Answer : All of the mentioned

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Consider an SAP system based on AS ABAP How many monitoring segments are used for the CCMS Monitoring Infrastructure? A. There is one monitoring segment for each host B. There is ... segment for each application server D. There is one monitoring segment for each central services instance

Last Answer : A. There is one monitoring segment for each host

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware

Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol used to monitor computers

Description : Quantitative attributes are A. A reference to the speed of an algorithm, which is quadratically dependent on the size of the data B. Attributes of a database table that can take only numerical values C. Tools designed to query a database D. None of these

Last Answer : B. Attributes of a database table that can take only numerical values

Description : In pursuing a CPA firm's quality control objectives, a CPA firm may maintain records indicating which partners or employees of the CPA firm were previously employed by the CPA firm's clients. Which ... to satisfy? a. Monitoring. b. Human resources. c. Ethical requirements. d. Engagement performance

Last Answer : Ethical requirements.

Description : More security using high-tech body scanners at airports - Would you be in favor of scanning children too?

Last Answer : Normal security? I'd imagine airport management would want specially trained individuals in charge of such checkpoints and scanners. If that is the case, I'd also suspect a deep psychological evaluation would be ... or gynecology. Sans the medical part. And I didn't read the article. Shame on me.