part of CIA would the following control mitigate: Testing is only allowed with test data, not production data? 2. What could a DDoS attack’s target be? 3. If you get a free USB flash drive at an event, what attack vector could it have?
. What part of CIA would the following control mitigate: Testing is only allowed with test data, not
production data?
2. What could a DDoS attack’s target be?
3. If you get a free USB flash drive at an event, what attack vector could it have?
4. If you have to use two passwords to login to a system, would that be an example of two factor
authentication? Why?
5. What is a two-man control policy?
6. To encrypt a document, would you need a block cipher or a stream cipher? Why?
7. How many key pairs must be managed in symmetric key encryption with 12 systems?
8. When sending a large set of files, would you use symmetric key encryption or asymmetric key
encryption? Why?
9. Why has every system a bottleneck?
10. What kind of errors can be found with endurance testing?
11. In performance testing, what is meant by a breakpoint?
12. Name a new example of the use of an ODS
13. In horizontal scaling, why does doubling the number of components not necessarily double the
performance?
14. Name an example of commercial computer grid operator
Trending now
This is a popular solution!
Step by step
Solved in 2 steps