August 2023

Article

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. When operating in a cloud environment, what cloud deployment model provides security teams with the greatest access to forensic information? A. FaaS B. SaaS C. PaaS D. laaS Correct Answer: D With Function as a Service (FaaS), you may not be able to access the computing system the function is operating on. So, that is not the best answer. With Software as a Service, (SaaS) again, you may only have access to the application. So, that is another incorrect answer. With Platform as a Service (PaaS), you have additional access to the coding environment. But that is not what we are looking for. Finally, Infrastructure as a service (IaaS) environments provide analysts with access to the operating system, allowing deeper forensic analysis than other cloud platforms that operate higher in the stack.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. What cryptographic technology enables anonymity in the Tor network? A. Elliptical Curve Cryptography B. Quantum Cryptography C. Key Stretching D. Perfect Forward Secrecy Correct Answer: D Elliptic curve cryptography has several uses including public key encryption, digital signatures, and secure protocols, but it is not the right answer. Quantum cryptography also has several uses including key exchange and secure communications, but it too is not the right answer either. Key stretching is used to strengthen encryption keys and passwords. So, that is not the correct answer here. The Tor network depends upon perfect forward secrecy to enable true anonymity. In this approach, each link in the Tor chain only knows the identity of the immediately adjacent links in the chain.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Roland recently wrote code that implements a new feature demanded by end users of an application he manages. He would like users to examine the feature and determine whether it meets their needs. What environment is most appropriate for this activity? A. Test B. Development C. Staging D. Production Correct Answer: A The process described, where users evaluate features to determine whether they meet business requirements, is known as user acceptance testing (UAT) and it should take place in the test environment. So, that is the correct answer. Roland would have created the new feature in a development environment. After the code passes testing, it will move on to staging and then finally into production.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...