150-200 Flashcards

(50 cards)

1
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

a , obfuscation is the action of making something obscure,unclear,unintelligible. creates code that is difficult for humans to read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A

c

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A

b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A

a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
A

d or MOU, is a nonbinding agreement that states each party’s intentions to take action, conduct a business transaction, or form a new partnership.

25
d As a quick refresher, RTO stands for Recovery Time Objective and is a measure of how quickly after an outage an application must be available again. RPO, or Recovery Point Objective, refers to how much data loss your application can tolerate.
26
c
27
28
29
c
30
d
31
A service-level agreement (SLA) is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
32
a
33
34
c EDR helps detect buffer overflow attacks by monitoring the memory usage of running processes and identifying any unusual activity, such as large buffer allocations or unexpected code execution
35
d
36
d
37
c
38
39
40
b
41
42
a
43
d
44
45
d
46
c
47
48
49
50
d