174 Chapter 7 ■ Security Operations (Domain 7)
- John deploys his website to multiple regions using load balancers around the world
through his cloud infrastructure as a service provider. What availability concept is he
using?
A. Multiple processing sites
B. Warm sites
C. Cold sites
D. A honeynet - Lauren wants to ensure that her users only run software that her organization has
approved. What technology should she deploy?
A. Blacklisting
B. Configuration management
C. Whitelisting
D. Graylisting - When one of the employees of Alice’s company calls in for support, she uses a code word
that the company agreed to use if employees were being forced to perform an action. What
is this scenario called?
A. Social engineering
B. Duress
C. Force majeure
D. Stockholm syndrome