
Cloud
Authored by Fred Lover
Other
University
Used 75+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
28 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
You want to disable use of insecure protocols over an untrusted network segment. Which TCP ports might you want to block? Choose all that apply.
21
22
23
143
443
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
On an IPsec VPN, what protocol negotiates security associations? Choose the best response.
AH
ESP
IKE
L2TP
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What security appliance is similar to a MitM attack, but designed to enhance network security rather than disrupt it? Choose the best response.
Split tunnel
SSL accelerator
SSL decryptor
VPN concentrator
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What model would describe a cloud accounting service? Choose the best response.
IaaS
PaaS
SaaS
SDN
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A primary benefit of employing a highly secure cloud service is that it ensures secure communications to and from the cloud. True or false?
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A fully collapsed DMZ results in data to be easily transferred directly between networks, thus bypassing the DMZ completely. True or false?
True
False
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following RAID levels incorporate(s) disk striping?
RAID 0
RAID 1
RAID 5
RAID 10
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?