DevNet Associate DEVASC 200-901 Official Certification Guide by Adrian Iliesiu (z-lib.org)

(andrew) #1
3. JWT token
4. Brute force
3. What type of test is used to identify the possible
weak spots in applications, servers, or networks?
1. Pen
2. White box
3. Eraser
4. Unit
4. Which of the following is a tool that can be used for
network discovery and security auditing?
1. Nslookup
2. Nmap
3. ps
4. curl
5. What is the minimum number of identity
components MFA uses to authenticate a user’s
identity?
1. One
2. Two
3. Three
4. Four
6. Which of the following is used for fingerprinting of
data to detect whether the data has been modified?
1. Private key
2. Public key
3. One-way hash
4. Certificate
7. Data needs to be secured in multiple locations.
Which of the following are the correct locations?
1. Memory, storage, and network
2. Flash, wire, and optics
3. Hard disk, database, and analytics
4. AWS, Google Cloud, and Azure
8. Which modes best describe IDSs and IPSs,
respectively?
1. Passive, passive
2. Passive, active
3. Active, passive
4. Active, active

FOUNDATION TOPICS

Free download pdf