Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In Azure, which of the following describes a "Contributor"?

A.

A collection of permissions such as read, write, and delete

B.

A designation on a PKI certificate

C.

A specification of who can access a resource group

D.

An object representing an entity

Below is an extract from a Server Access Log showing arecord for a request made to an AWS S3 bucket. What does the first field starting with "385f9e" represent?

A.

Bucket Owner

B.

Request ID

C.

Host ID

D.

Cipher Suite

Which of the following is available with the free tier of service for CloudTrail?

A.

Single trail of management events delivered to Amazon

B.

Access to data-related API Cloud Trail events

C.

Access to CloudTrail Insights to detect anomalies

D.

Default trail maintained by AWS for more than 90 days

Sensitive company data is found leaked on the internet, and the security team didn't

get any alert and is unsure of how the breach occurred.

Which logs would be a preferable starting point for an investigation?

A.

Identity and Access Management

B.

Application

C.

Resource Management

D.

Endpoint

What method does Google use to alert Gmail account holders that they may be under attack by government sponsored attackers?

A.

Message upon successful logon

B.

SMS text message

C.

Email sent to the user

D.

Alert sent to recovery account

At what point of the OAuth delegation process does the Resource Owner approve the scope of access to be allowed?

A.

After user credentials are accepted by the Authorization Server

B.

Once the OAuth token is accepted by the Application

C.

When the Resource Server receives the OAuth token

D.

Before user credentials are sent to the Authentication Server

Which of the following is the smallest unit of computing hardware in Kubernetes?

A.

Cluster

B.

Node

C.

Container

D.

Pod

Which of the following actions described below would populate the suggestions table on an Android phone?

A.

Google Maps recommends locations, which are cached in the table

B.

Google Maps tracks previously entered destinations by the user

C.

The table contains previously saved or bookmarked destinations

Where are iOS Class keys stored?

A.

In iCloud

B.

Within the metadata of each file

C.

Between the flash memory and the system area on the device

D.

In effacable storage

What can bedetermine about the AVVS Access Key below?

AKIAVNKBKCM4I3VNZIS3

A.

The key belongs to a user account

B.

The key will only work internally

C.

It is a service STS token

D.

It is only in use for a single session