<< Prev Question Next Question >>

Question 88/129

Abel, a cloud architect, uses container technology to deploy applications/software including all its dependencies, such as libraries and configuration files, binaries, and other resources that run independently from other processes in the cloud environment. For the containerization of applications, he follows the five-tier container technology architecture. Currently. Abel is verifying and validating image contents, signing images, and sending them to the registries. Which of the following tiers of the container technology architecture Is Abel currently working in?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (129q)
Question 1: Identify the UDP port that Network Time Protocol (NTP) uses ...
Question 2: Which of the following tools are used for enumeration? (Choo...
Question 3: Which of the following program infects the system boot secto...
Question 4: You receive an e-mail like the one shown below. When you cli...
Question 5: If you want to only scan fewer ports than the default scan u...
Question 6: Robin, a professional hacker, targeted an organization's net...
Question 7: Your company was hired by a small healthcare provider to per...
Question 8: A new wireless client is configured to join a 802.11 network...
Question 9: What is the first step for a hacker conducting a DNS cache p...
Question 10: Eve is spending her day scanning the library computers. She ...
Question 11: What do Trinoo, TFN2k, WinTrinoo, T-Sight, and Stracheldraht...
Question 12: Which regulation defines security and privacy controls for F...
Question 13: You have been authorized to perform a penetration test again...
Question 14: Which command can be used to show the current TCP/IP connect...
1 commentQuestion 15: You have successfully logged on a Linux system. You want to ...
Question 16: infecting a system with malware and using phishing to gain c...
Question 17: This form of encryption algorithm is asymmetric key block ci...
Question 18: Peter, a Network Administrator, has come to you looking for ...
Question 19: What is correct about digital signatures?...
Question 20: Study the following log extract and identify the attack. (Ex...
Question 21: What does the -oX flag do in an Nmap scan?...
3 commentQuestion 22: In order to tailor your tests during a web-application scan,...
Question 23: Bob received this text message on his mobile phone: "Hello, ...
1 commentQuestion 24: Clark is a professional hacker. He created and configured mu...
Question 25: When a normal TCP connection starts, a destination host rece...
Question 26: Allen, a professional pen tester, was hired by xpertTech sol...
Question 27: The collection of potentially actionable, overt, and publicl...
Question 28: The network administrator at Spears Technology, Inc has conf...
Question 29: An attacker attaches a rogue router in a network. He wants t...
Question 30: How can you determine if an LM hash you extracted contains a...
Question 31: Taylor, a security professional, uses a tool to monitor her ...
Question 32: The establishment of a TCP connection involves a negotiation...
Question 33: which of the following Bluetooth hacking techniques refers t...
Question 34: You have retrieved the raw hash values from a Windows 2000 D...
Question 35: Ricardo has discovered the username for an application in hi...
Question 36: Widespread fraud ac Enron. WorldCom, and Tyco led to the cre...
Question 37: Bob, a system administrator at TPNQM SA, concluded one day t...
Question 38: Which type of sniffing technique is generally referred as Mi...
Question 39: The following is an entry captured by a network IDS. You are...
Question 40: What is the proper response for a NULL scan if the port is o...
Question 41: Every company needs a formal written document which spells o...
Question 42: The network team has well-established procedures to follow f...
Question 43: What is the purpose of DNS AAAA record?...
Question 44: Richard, an attacker, aimed to hack loT devices connected to...
Question 45: Dorian Is sending a digitally signed email to Polly, with wh...
Question 46: What is the proper response for a NULL scan if the port is c...
Question 47: John, a professional hacker, decided to use DNS to perform d...
Question 48: John is an incident handler at a financial institution. His ...
Question 49: In an internal security audit, the white hat hacker gains co...
Question 50: Peter is surfing the internet looking for information about ...
Question 51: Internet Protocol Security IPsec is actually a suite pf prot...
Question 52: (Exhibit) Identify the correct terminology that defines the ...
Question 53: Yancey is a network security administrator for a large elect...
Question 54: in an attempt to increase the security of your network, you ...
Question 55: Heather's company has decided to use a new customer relation...
Question 56: Daniel Is a professional hacker who Is attempting to perform...
Question 57: Which results will be returned with the following Google sea...
Question 58: During a recent security assessment, you discover the organi...
Question 59: Which of the following represents the initial two commands t...
Question 60: An organization is performing a vulnerability assessment tor...
Question 61: Susan has attached to her company's network. She has managed...
Question 62: Which definition among those given below best describes a co...
Question 63: Which of the following Linux commands will resolve a domain ...
Question 64: Johnson, an attacker, performed online research for the cont...
Question 65: John, a professional hacker, performs a network attack on a ...
1 commentQuestion 66: Annie, a cloud security engineer, uses the Docker architectu...
Question 67: To reach a bank web site, the traffic from workstations must...
Question 68: You have gained physical access to a Windows 2008 R2 server ...
1 commentQuestion 69: Alice needs to send a confidential document to her coworker....
Question 70: Wilson, a professional hacker, targets an organization for f...
Question 71: While browsing his Facebook teed, Matt sees a picture one of...
Question 72: The network users are complaining because their system are s...
Question 73: Which of the following tools can be used for passive OS fing...
Question 74: Which of the following LM hashes represent a password of les...
Question 75: There have been concerns in your network that the wireless n...
Question 76: A hacker is an intelligent individual with excellent compute...
1 commentQuestion 77: Bob was recently hired by a medical company after it experie...
1 commentQuestion 78: These hackers have limited or no training and know how to us...
Question 79: What is the BEST alternative if you discover that a rootkit ...
Question 80: What is a NULL scan?
Question 81: in this form of encryption algorithm, every Individual block...
Question 82: When purchasing a biometric system, one of the consideration...
Question 83: jane, an ethical hacker. Is testing a target organization's ...
Question 84: Kevin, a professional hacker, wants to penetrate CyberTech I...
Question 85: Fred is the network administrator for his company. Fred is t...
Question 86: You start performing a penetration test against a specific w...
Question 87: An attacker has installed a RAT on a host. The attacker want...
Question 88: Abel, a cloud architect, uses container technology to deploy...
Question 89: Eric has discovered a fantastic package of tools named Dsnif...
Question 90: DNS cache snooping is a process of determining if the specif...
1 commentQuestion 91: Samuel, a professional hacker, monitored and Intercepted alr...
Question 92: You are performing a penetration test for a client and have ...
Question 93: What is not a PCI compliance recommendation?...
Question 94: what are common files on a web server that can be misconfigu...
Question 95: A penetration tester is conducting a port scan on a specific...
Question 96: Andrew is an Ethical Hacker who was assigned the task of dis...
Question 97: Switches maintain a CAM Table that maps individual MAC addre...
Question 98: User A is writing a sensitive email message to user B outsid...
Question 99: _________ is a tool that can hide processes from the process...
Question 100: what is the port to block first in case you are suspicious t...
Question 101: Your company performs penetration tests and security assessm...
Question 102: You are the Network Admin, and you get a complaint that some...
Question 103: Nedved is an IT Security Manager of a bank in his country. O...
1 commentQuestion 104: Susan, a software developer, wants her web API to update oth...
1 commentQuestion 105: Ethical hacker jane Smith is attempting to perform an SQL in...
Question 106: You are analysing traffic on the network with Wireshark. You...
Question 107: Scenario1: 1.Victim opens the attacker's web site. 2.Attacke...
Question 108: Attacker Rony Installed a rogue access point within an organ...
Question 109: Which type of security feature stops vehicles from crashing ...
Question 110: After an audit, the auditors Inform you that there is a crit...
Question 111: Peter extracts the SIDs list from Windows 2000 Server machin...
Question 112: While performing online banking using a Web browser, a user ...
Question 113: Which service in a PKI will vouch for the identity of an ind...
Question 114: MX record priority increases as the number increases. (True/...
Question 115: A large company intends to use Blackberry for corporate mobi...
Question 116: Which of the following is the structure designed to verify a...
Question 117: This wireless security protocol allows 192-bit minimum-stren...
Question 118: Identify the web application attack where the attackers expl...
Question 119: How is the public key distributed in an orderly, controlled ...
Question 120: The configuration allows a wired or wireless network interfa...
Question 121: The tools which receive event logs from servers, network equ...
Question 122: Gilbert, a web developer, uses a centralized web API to redu...
Question 123: You are programming a buffer overflow exploit and you want t...
Question 124: You just set up a security system in your network. In what k...
Question 125: What hacking attack is challenge/response authentication use...
Question 126: A technician is resolving an issue where a computer is unabl...
Question 127: An LDAP directory can be used to store information similar t...
Question 128: Morris, a professional hacker, performed a vulnerability sca...
Question 129: Which of the following statements about a zone transfer is c...