150-200 Flashcards

1
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

a , obfuscation is the action of making something obscure,unclear,unintelligible. creates code that is difficult for humans to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
A
22
Q
A
23
Q
A

d or MOU, is a nonbinding agreement that states each party’s intentions to take action, conduct a business transaction, or form a new partnership.

24
Q
A

c

25
Q
A

d As a quick refresher,

RTO stands for Recovery Time Objective and is a measure of how quickly after an outage an application must be available again.

RPO, or Recovery Point Objective, refers to how much data loss your application can tolerate.

26
Q
A

c

27
Q
A
28
Q
A
29
Q
A

c

30
Q
A

d

31
Q
A

A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.

32
Q
A

a

33
Q
A
34
Q
A

c EDR helps detect buffer overflow attacks by monitoring the memory usage of running processes and identifying any unusual activity, such as large buffer allocations or unexpected code execution

35
Q
A

d

36
Q
A

d

37
Q
A

c

38
Q
A
39
Q
A
40
Q
A

b

41
Q
A
42
Q
A

a

43
Q
A

d

44
Q
A
45
Q
A

d

46
Q
A

c

47
Q
A
48
Q
A
49
Q
A
50
Q
A

d