- Get link
- X
- Other Apps
CYB 205 Infrastructure Administration
Q: Derek sets up a series of virtual machines that are automatically created in a completely isolated environment. Once created, the systems are used to run potentially malicious software and files. The actions taken by those files and programs are recorded and then reported. What technique is Derek using?
A: Sandboxing
Explanation: Derek is using a sandboxing technique, which is a software management strategy that isolates applications from critical system resources and other programs.Answer B is incorrect. A honeypot is a sacrificial system placed on the outward-facing areas of the organization's network.Answer A is incorrect. Network access control (NAC) is a set of services that give network administrators the ability to define and control what devices, processes, and persons can connect to the network or to individual subnetworks or segments of that network.Answer D is incorrect. Social engineering encompasses almost any effort to learn about the people in the organization and find exploitable weaknesses via those people.
- Get link
- X
- Other Apps
Comments
Post a Comment