Which primary security control should be used by all cloud accounts, including individual users, in order to defend against the widest range of attacks?

A. Multi-factor authentication
B. Logging and monitoring
C. Perimeter security
D. Redundant infrastructure


Ans: A. Multi-factor authentication

Computer Science & Information Technology

You might also like to view...

____ are a helpful layout tool when creating forms.

A. Boxes B. Task panes C. Tables D. Toolbars

Computer Science & Information Technology

To remove a worksheet group, you can right-click the sheet tab of a sheet in the group and then click ____ on the shortcut menu.

A. Remove Group B. No Group C. Exit Group D. Ungroup Sheets

Computer Science & Information Technology

When using inheritance, the class that provides attributes to be inherited is called the ____ class.

A. inheriting B. base C. distributing D. disseminating

Computer Science & Information Technology

A company is in the middle of an operating system update to Windows 10 from Windows XP, Windows 7, and Windows 8.x. The diverse nature of the update has made it imperative that the help desk techs have the ability to run several concurrent VMs. A few of the techs are experiencing frequent and extended periods of 100% CPU usage on their computers, and these spikes are limiting their ability to assist users in a timely manner.   Which of the following is most likely causing this behavior?

A. Insufficient number of physical processor cores. B. Disabled hardware-assisted virtualization. C. Dynamic allocation of RAM is disabled. D. One or more VHDs are running out of free disk space.

Computer Science & Information Technology