Computer Science Questions
Explore questions in the Computer Science category that you can ask Spark.E!
Identify the term that applies to the statement below:Maximum duration of time within which the restoration process must be completed in order to avoid unacceptable consequences.
You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of 'top secret' so that user can access classified files. What type of access control method is being used?
Which of the following is a scripting language?
You are creating ACL entries to provide access to a resource within a small network setup. What type of access control model is this?
Your business sets the maximum amount of data that can be lost in a disaster scenario as "two days" worth. What term describes this?
What process creates randomly generated placeholders for protecting sensitive information?
To address an organization's disaster recovery requirements, backup intervals should not exceed the:
Which is a separate facility that does not have any computer equipment but is a place where the knowledge workers can move after the disaster?
An organization recently had a disaster and was switched to an alternate facility. The original data center has now been restored and the administrator needs to migrate the organization back to the primary data center. What process is the administrator performing?
Which of the following backup technique is most space efficient?
You are encrypting an e-mail addressed to your colleague Roman. Which key will be used to encrypt?
You are designing a disaster recovery plan that includes a multisite configuration. The alternate site must include all necessary hardware and current backups of the original site. What type of site do you need to design?
Which of the following is the MOST important consideration when defining recovery point objective (RPO)?
You work as an administrator for an SMB that runs its own on-premise IT infrastructure but wants to adopt the public cloud for its benefits. You are contemplating extending your on-site setup into the AWS cloud by using a VPN tunnel. What protocol will allow secure transmission of applications and data between the two environments?
Sean configures a web application to allow the team of content managers to upload files to the website. What type of access control model is Sean using?
You are creating a two-tier architecture comprising of a web tier and a database tier within your Amazon VPC. Where will you deploy the database servers?
Which key is used to validate a digital signature?
You would like user authentication to occur against your on-premises identity store. Users will then be authorized to use on-premise as well as cloud-based services. What configuration is this?
Your company has deployed six Windows EC2 instances in AWS cloud. As the administrator, you would like to remotely access the VMs from your on-premise machine using the Remote Desktop Protocol (RDP). What should you configure to allow that traffic
Which of the following phases are not a part of vulnerability scanning and unique to penetration testing? Choose all that apply.
