Review Questions
The following questions are designed to test your understanding of this chapter’s material. For more information on how to obtain additional questions, please see this book’s Introduction. You can find the answers in Appendix A.
-
Robert has been tasked to create a security implementation that segments his employer’s e-commerce design to allow for policy enforcement. What are some of the areas that he is investigating? (Choose three.)
- Network
- Automation
- Storage
- Compute
- APIs
- JSON/XML
-
MFA tokens can be obtained where? (Choose two.)
- Python app
- Smartphone app
- Automation systems
- Keyfob
- Cloud vendor management dashboard
-
Hank just completed running some security automation scripts on his new fleet of application virtual machines. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his management dashboard?
- DMA
- BIOS
- CPU
- IPSec
- I/O
-
What technology was instrumental...