Network and Cloud
Network and Cloud
20. What type of rootkit intercepts Hardware calls made by a target operating system hosted as a
virtual machine?
a. Hypervisor Rootkit
b. Kernel Rootkit
c. Application Level Rootkit
d. Bootkit
21. Assume that you manage a business website that has faced unexpected downtimes affecting
user satisfaction. To address this, you decide to employ a website monitoring service. What is
the primary goal of implementing a website monitoring service in this scenario? Select the
correct answer form the given choices.
a. Enhance website design and functionality
b. Optimize server load during peak traffic.
c. Ensure regular Maintenance of the website.
d. Proactively detect and address unexpected downtime
22. Assume that a small business has recently migrated its email services to a cloud based platform
to improve reliability and accessibility. However, concerns have arisen regarding the security of
email communications and the risk of phishing attacks targeting employees email accounts. As a
network security consultant, you are tasked with evaluation the email security measures to
protect sensitive business communications in the cloud Which email security mechanism is most
effective for detecting and preventing phishing attacks targeting employees email accounts in a
cloud based email service? Select the correct option from the given choices.
a. SPF (Sender Policy Framework)
b. DMARC (Domain-based Message Authentication Reporting Conformance)
c. DKIM (Domain Keys Identified Mail)
d. TLS (Transport Layer Security)
23. Assume that a company wants to deploy a cloud based database that can scale horizontally to
accommodate growing data volumes and user traffic.which database model will be most
suitable in this case? Select he correct option from the given choices
a. Relational Databases
b. NoSQL Database
c. Data Warehouse
d. In-Memory Database
24. Consider the ABC organization is planning to enhance the security of its cloud –based services
with Active Directory by implementing a Multi Factor Authentication (MFA) system. Which MFA
approach would be the most appropriate and secure? Select the correct answer form the given
choices
a. Time based one-time password (TOTP) Algorithm with Token Authentication
b. Time Based One-Time Password(TOTP) Algorithm with Authentication
c. Hardware token Authentication with SMS Based
d. SMS based Authentication with Biometric verified
25. Assume that Alice wants to securely communicate with Bob over the internet and devides to
obtain a digital certificated from a trusted Certificate Authority. In this scenario which trust
model should Alice choose for the highest security? Select the correct answer form the given
choices.
a. Hierarchical trust model
b. Web of trust model
c. Mesh trust model
d. Centralized trust model
26. Assume that in a corporate Wi-Fi setup, employees need secure access. Which EAP
authentication method simplifies the process by using only server-side certificates? Select the
correct answer form the given choices.
a. EAP-MD-5
b. EAP-TLS
c. EAP-TTLS
d. PEAP
27. In a computer system utilizing machine learning algorithms, what is the main purpose of using a
‘Convolutional Neural network’ (CNN)?
a. For time-series
b. For Clustering and association in unsupervised learning
c. For image and video recognition
d. For text processing and