July 2022

Article

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Tina would like to use a technology that will allow her to bundle up workloads and easily move them between different operating systems. What technology would best meet this need? A. Virtual Machines B. Serverless Computing C. Hypervisors D. Containers Correct Answer: A Containers do not provide easy portability because they are dependent upon the host operating system. Hypervisors are used to host virtual machines on a device, so that is another incorrect answer. Serverless computing is a platform-as-a-service model that allows cloud customers to run their own code on the provider’s platform without provisioning servers, so that is also incorrect. Virtual machines are self-contained and have their own internal operating system, so it is possible to move them between different host operating systems.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Zeke is responsible for sanitizing a set of solid state drives removed from servers in his organization’s data center. The drives will be reused on a different project. Which one of the following sanitization techniques would be most effective? A. Cryptographic Erasure B. Physical Destruction C. Degaussing D. Overwriting Correct Answer: A Cryptographic erasure is a strong sanitization technique that involves encrypting the data with a strong encryption engine and then taking the keys generated in that process, encrypting them with a different encryption engine, and destroying the resulting keys of the second round of encryption. This technique is effective on both magnetic and solid state drives. Degaussing and overwriting are not effective on SSDs. Physical destruction would effectively sanitize the media but would prevent Zeke from reusing the drives. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...