Chapter 7 ■ Security Operations (Domain 7) 169
- In what virtualization model do full guest operating systems run on top of a virtualization
platform?
A. Virtual machines
B. Software-defined networking
C. Virtual SAN
D. Application virtualization - What level of RAID is also known as disk mirroring?
A. RAID-0
B. R A ID-1
C. RAID-5
D. R A ID-10
- Bruce is seeing quite a bit of suspicious activity on his network. It appears that an outside
entity is attempting to connect to all of his systems using a TCP connection on port 22.
What type of scanning is the outsider likely engaging in?
A. FTP scanning
B. Telnet scanning
C. SSH scanning
D. HTTP scanning - The historic ping of death attack is most similar to which of the following modern
attack types?
A. SQL injection
B. Cross-site scripting
C. Buffer overflow
D. Brute-force password cracking - Roger recently accepted a new position as a security professional at a company that runs
its entire IT infrastructure within an IaaS environment. Which one of the following would
most likely be the responsibility of Roger’s firm?
A. Configuring the network firewall
B. Applying hypervisor updates
C. Patching operating systems
D. Wiping drives prior to disposal - What technique can application developers use to test applications in an isolated virtual-
ized environment before allowing them on a production network?
A. Penetration testing
B. Sandboxing
C. White box testing
D. Black box testing