In: Computer Science
15.
Question 15
Ali must grant access to any individual or group he wants to allow access to the files he owns. Which access control type is in use in Ali's organization?
1 point
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Hierarchical Access Control (HAC)
Role Based Access Control (RBAC)
16.
Question 16
A Windows 10 user has 10 files with exactly the same name. Which statement must be true for these files?
1 point
The files may be on the same hard drive but must be in different partitions
The files must be in different directories.
The files may be in the same directory.
The files must be on different hard drives.
17.
Question 17
Which three (3) permissions can be set on a file in Linux? (Select 3)
1 point
run
view
read
write
modify
execute
18.
Question 18
If cost is the primary concern, which type of cloud should be considered first?
1 point
Hybrid cloud
Universal cloud
Private cloud
Public cloud
19.
Question 19
Consolidating and virtualizing workloads should be done when?
1 point
It does not matter; these steps require approximately the same amount of work no matter when you elect to do them.
After moving the workloads to the cloud but before they are open to users.
Gradually as you generate usage metrics.
Before moving the workloads to the cloud.
20.
Question 20
Which of the following is a self-regulating standard set up by the credit card industry in the US?
1 point
PCI-DSS
GDPR
HIPAA
NIST 800-53A
ISO27000 series
21.
Question 21
Which two (2) of the following attack types target endpoints?
1 point
SQL Injection
Spear Phishing
Denial of Service (DoS)
Ad Network
15.) Discretionary Access Control (DAC)
because it is a type of access control system that holds the owner responsible for deciding which people are allowed in a specific location.
16.) The files must be in different directories.
Because OS wants unique file names because when you will tell OS to do something, and you have two files with exactly the same name, OS can't know which file to perform the action on. So every files must be unique whey are in the same directories.
17.) Read, write and execute.
Linux divides the file permissions into read, write and execute denoted by r,w, and x.
18.) If cost is the primary concern then we should use Public cloud
Because It has no maintenence cost and it is highly flexible and scalable.and it also reduced the complexity.
19.) It does not matter; these steps require approximately the same amount of work no matter when you elect to do them.
20.) .PCI-DSS
is a self-regulating standard set up by the credit card industry in the US.These includes visa,Mastercard,discoverand american Express.
21.) SQL injection and spear pishing
-------------------------------------------------------------Thank You--------------------------------------------------------------------------