Tag Archives: security

Given: (Exhibit) Which three actions implement Java SE security guidelines? (Choose three.)

Given:Which three actions implement Java SE security guidelines? (Choose three.) A. Change line 2 to protected volatile String[] names;. B. Change line 2 to private final String[] names;. C. Change line 3 to private Secret(String[] names) {. D. Change line 7 to return names.clone();. E. Change line 4 to this.names = names.clone();. F. Change line 6 to public… Read More »

Given: (Exhibit) Which three actions implement Java SE security guidelines? (Choose three.)

Given:Which three actions implement Java SE security guidelines? (Choose three.) A. Change line 6 to public synchronized String[] getNames() {. B. Change line 2 to private final String[] names;. C. Change line 3 to private Secret(String[] names) {. D. Change line 7 to return names.clone();. E. Change line 4 to this.names = names.clone();. F. Change the getNames() method… Read More »

Which is NOT considered a security resource within Oracle Cloud Infrastructure?

Which is NOT considered a security resource within Oracle Cloud Infrastructure? A. Network Security Group B. Web Application Firewall C. File Storage Service D. Security Lists Correct Answer: C Oracle Cloud Infrastructure File Storage service provides a durable, scalable, secure, enterprise-grade network file system. You can connect to a File Storage service file system from any bare metal,… Read More »

Which security issue CANNOT be Identified by using Oracle Cloud Infrastructure (OCI) Vulnerability Scanning

Which security issue CANNOT be Identified by using Oracle Cloud Infrastructure (OCI) Vulnerability Scanning Service (VSS)? A. Ports that are unintentionally left open B. OS configurations that hackers might exploit C. OS packages that require updates and patches to address vulnerabilities D. Cross-Site scripting (XSS) Correct Answer: C

According to Shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure

According to Shared security model, which two are a customer’s responsibilities in Oracle Cloud Infrastructure (OCI)? A. Physical security of OCI data center facilities B. Virtual Machine hypervisor C. Local NVMe data persistence D. Customer data E. Object Storage data durability Correct Answer: D,E Customer and Oracle’s responsibilities can be divided into the following areas:Physical Security: Oracle is… Read More »

A pod security policy (PSP) is implemented in your Oracle Cloud Infrastructure Container Engine for Kubernetes

A pod security policy (PSP) is implemented in your Oracle Cloud Infrastructure Container Engine for Kubernetes cluster Which rule can you use to prevent a container from running as root using PSP? A. NoPrivilege B. RunOnlyAsUser C. MustRunAsNonRoot D. forbiddenRoot Correct Answer: C ExplanationWhat is a Pod Security Policy?A Pod Security Policy is a cluster-level resource that controlssecurity… Read More »

A pod security policy (PSP) is implemented in your Oracle Cloud Infrastructure Container Engine for Kubernetes

A pod security policy (PSP) is implemented in your Oracle Cloud Infrastructure Container Engine for Kubernetes cluster Which rule can you use to prevent a container from running as root using PSP? A. NoPrivilege B. RunOnlyAsUser C. MustRunAsNonRoot D. forbiddenRoot Correct Answer: C What is a Pod Security Policy?A Pod Security Policy is a cluster-level resource that controls… Read More »

ISP ASN 65100 provides Internet services to router CE-1 and receives customer prefix 198.18.18.0/24 via eBGP. An administrator for the ISP is now provisioning RTBH services to provide on-demand data-plane security for the customer’s IP space. Which route-map configuration must the administrator apply to router RTBH-1 to complete the implementation of RTBH services to CE-1?

Refer to the exhibit. ISP ASN 65100 provides Internet services to router CE-1 and receives customer prefix 198.18.18.0/24 via eBGP. An administrator for the ISP is now provisioning RTBH services to provide on-demand data-plane security for the customer’s IP space. Which route-map configuration must the administrator apply to router RTBH-1 to complete the implementation of RTBH services to… Read More »

Which two security features are available when implementing NTP? (Choose two.)

A. encrypted authentication mechanism B. symmetric server passwords C. clock offset authentication D. broadcast association mode E. access list-based restriction scheme Answer: Option A, E. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which two security features are available when implementing NTP? (Choose two.) appeared first on Majanto.