A Chief Information Security Officer (CISO) asks the security architect to design a method for contractors to access the company’s network securely without allowing to systems beyond the scope of their project. Which of the following methods would BEST fit the needs of the CISO? a. VPN
b. Paas
c. Iaas
d. VDI

Answers

Answer 1
Answer:

Answer:d) VDI(Virtual desktop infrastructure)

Explanation: VDI(Virtual desktop infrastructure) is the infrastructure of the managing technology the virtual desktops.The central host is the devices that helps in the management of the  these virtual devices/desktop. Hypervisor is required for virtualization of the server .It also provides security by providing data at the data center/hub.

Other options are incorrect because VPN(Virtual private network)small network connection in network environment with less security, Paas (platform as a service) is a cloud computing technology for users to develop application and Laas(Location as a service)  helps in delivering the location.Thus , the correct option is option (d).


Related Questions

COLLEGE

Consider a file system that uses inodes to represent files. Disk blocks are 2KB in size and a pointer to a disk block requires 4 bytes. Consider a file whose inode has 6 direct disk blocks, plus 1 single indirect, and 1 double indirect disk blocks. What is the maximum size of the file? If we use bitmap to manage the free space, how many disk blocks are required to hold the bitmap of 32 GB disk?

Answers

Answer:

a.  Maximum size of file = 8.003 GB

Explanation:

a. Maximum size of file

= (6 * 2 KB) + (2048 * 2 KB) + (2048 * 2048 * 2 KB)

= 12kb + 4096 Kb +  8388608 kb

= 8392716 kb

8392716/1024 mb = 8196.01 MB

8196.01 /1024 GB= 8.003 GB

b. According to above calculation

For 8 GB 6 direct, 1 single and 1 double indirect block requires

so

for 32 GB

24 direct Block

4 single and 4 double indirect block requires

HIGH SCHOOL

Which of the following protects against cave-ins? A. All answer choices protect against cave-ins B. Shielding C. Shoring D. Sloping

Answers

Answer: A) All answer choices protect against cave-ins

Explanation: Cave-in is the situation relating with collapse action of walls, boundaries, etc of any infrastructure ,roof, building etc.  The main methods used for prevention of cave-in situation are sloping shielding and shoring.

Sloping is the method in which prevents the sloping back of elements of site while experiencing high pressure. Shielding is the form of covering that is obtained by using trench boxes or other element for the support to act as shield .

Shoring is the technique in which prevention of cave-in is done through hiring aluminum hydraulic and related supporting components so that cave-ins can be stopped. Thus, all the options are correct.

I think it is b idk if it is 100% right
COLLEGE

Write a program to check if an input is a valid hashtag (starts with #, contains only letters, numbers, and underscore, no space or special characters). (1) Name your program hashtag.c.
(2) The user input ends with the user pressing the enter key (a new line character).
(3) Library function isalpha(), isdigit(), and isalnum() are not allowed in this program.
(4) Use getchar() to read in the input.

Answers

Answer:

C code is given below

Explanation:

#include

int main()

{

  printf("Input:");

  int ch;

  int valid=1; // it is set as 1 initially if anything is wrong it is changed to 0

  ch=getchar();

  if(ch!='#') // it checks if it starts with #

  {

      valid=0;

  }

while((ch = getchar())!= '\n') // this loop runs till line ends

  {

if((ch>='a'&&ch='A'&&ch='0'&&ch

HIGH SCHOOL

When you use file explorer or windows explorer to delete a file from the hard drive, where does windows put the file?

Answers

Trash bin

Reasons:

When you remove a file from the hard drive it is still written in binary code. So, windows places files in the *trash bin* if you did not want to delete it.
Unless USB or Removable flash drive, when you delete that it does not place any files in the trash bin.

Random Questions