Which primary security control should be used by all cloud accounts, including individual users, in order to defend against the widest range of attacks?
A. Multi-factor authentication
B. Logging and monitoring
C. Perimeter security
D. Redundant infrastructure
Ans: A. Multi-factor authentication
You might also like to view...
____ are a helpful layout tool when creating forms.
A. Boxes B. Task panes C. Tables D. Toolbars
To remove a worksheet group, you can right-click the sheet tab of a sheet in the group and then click ____ on the shortcut menu.
A. Remove Group B. No Group C. Exit Group D. Ungroup Sheets
When using inheritance, the class that provides attributes to be inherited is called the ____ class.
A. inheriting B. base C. distributing D. disseminating
A company is in the middle of an operating system update to Windows 10 from Windows XP, Windows 7, and Windows 8.x. The diverse nature of the update has made it imperative that the help desk techs have the ability to run several concurrent VMs. A few of the techs are experiencing frequent and extended periods of 100% CPU usage on their computers, and these spikes are limiting their ability to assist users in a timely manner. Which of the following is most likely causing this behavior?
A. Insufficient number of physical processor cores. B. Disabled hardware-assisted virtualization. C. Dynamic allocation of RAM is disabled. D. One or more VHDs are running out of free disk space.