A security engineer would like to analyze the effect of deploying a system without patching it to discover potential vulnerabilities. Which of the following practices would best allow for this testing while keeping the corporate network safe?

A. Perform grey box testing of the system to verify the vulnerabilities on the system
B. Utilize virtual machine snapshots to restore from compromises
C. Deploy the system in a sandbox environment on the virtual machine
D. Create network ACLs that restrict all incoming connections to the system


Answer: C. Deploy the system in a sandbox environment on the virtual machine

Computer Science & Information Technology

You might also like to view...

A Combobox’s ________ property, when set to ________, specifies that the Combobox values cannot be edited by the user and that the Combobox will use a drop-down list to display its values.

a) DropDown, List b) Style, DropDown c) DropDownStyle, List d) DropDownStyle, DropDownList e) Style, DropDownList

Computer Science & Information Technology

A feature of Windows XP that allows you to start more than one program at a time is:

A) multi-windowing. B) multiprogramming. C) multi-menus. D) multitasking.

Computer Science & Information Technology

After a thread gets access to the CPU and executes some instructions in its run method, the thread can lose access to the CPU in several ways. Describe three ways, and how the threads are resumed. What is context switching?

What will be an ideal response?

Computer Science & Information Technology

You can't code which one of the following as part of a CREATE TABLE statement:

A. not null constraints B. function-based indexes C. table-level constraints D. column-level constraints

Computer Science & Information Technology