Chapter 7 ■ Security Operations (Domain 7) 159
File Modifications
Monday 8 a.m. - File 1 created
Monday 10 a.m. - File 2 created
Monday 11 a.m. - File 3 created
Monday 4 p.m. - File 1 modified
Monday 5 p.m. - File 4 created
Tuesday 8 a.m. - File 1 modified
Tuesday 9 a.m. - File 2 modified
Tuesday 10 a.m. - File 5 created
Wednesday 8 a.m. - File 3 modified
Wednesday 9 a.m. - File 6 created
- Which one of the following security tools is not capable of generating an active response to
a security event?
A. IPS
B. Firewall
C. IDS
D. Antivirus software - In virtualization platforms, what name is given to the module that is responsible for con-
trolling access to physical resources by virtual resources?
A. Guest machine
B. SDN
C. Kernel
D. Hypervisor - What term is used to describe the default set of privileges assigned to a user when a new
account is created?
A. Aggregation
B. Transitivity
C. Baseline
D. Entitlement - Which one of the following types of agreements is the most formal document that contains
expectations about availability and other performance parameters between a service
provider and a customer?
A. Service-level agreement (SLA)
B. Operational-level agreement (OLA)
C. Memorandum of understanding (MOU)
D. Statement of work (SOW)