in Education by
_____ platforms are used for safety and protection of information in the cloud. (a) Cloud workload protection platforms (b) Cloud security protocols (c) AWS (d) One Drive I have been asked this question during an interview. This question is from Information Security Technologies in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
Right option is (a) Cloud workload protection platforms The best I can explain: Nowadays data centres support workloads from different geographic locations across the globe through physical systems, virtual machines, servers, and clouds. Their security can be managed using Cloud workload protection platforms which manage policies regarding security of information irrespective of its location.

Related questions

0 votes
    _________ is one of the most widely used web server platforms. (a) IIS (b) IAS (c) ISS (d) AIS ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    ______ means the protection of data from modification by unknown users. (a) Confidentiality (b) Integrity (c) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    RE is often defined as the crafting technique of ____________ who uses his skills to remove copy protection or ... -Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    _______ technology is used for analyzing and monitoring traffic in network and information flow. (a) Cloud access security ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    The _____________ command is used on Linux for getting the DNS and host-related information. (a) dnslookup (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Which of the following information security technology is used for avoiding browser-based hacking? (a) Anti-malware in ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is the technique used to look for information in trash or around dustbin container? (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Data integrity gets compromised when _____ and _____ are taken control off. (a) Access control, file deletion (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    When you use the word _____ it means you are protecting your data from getting disclosed. (a) Confidentiality (b) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...