Search Header Logo

Cloud

Authored by Fred Lover

Other

University

Used 75+ times

Cloud
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

You want to disable use of insecure protocols over an untrusted network segment. Which TCP ports might you want to block? Choose all that apply.

21

22

23

143

443

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On an IPsec VPN, what protocol negotiates security associations? Choose the best response.

AH

ESP

IKE

L2TP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security appliance is similar to a MitM attack, but designed to enhance network security rather than disrupt it? Choose the best response.

Split tunnel

SSL accelerator

SSL decryptor

VPN concentrator

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What model would describe a cloud accounting service? Choose the best response.

IaaS

PaaS

SaaS

SDN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A primary benefit of employing a highly secure cloud service is that it ensures secure communications to and from the cloud. True or false?

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A fully collapsed DMZ results in data to be easily transferred directly between networks, thus bypassing the DMZ completely. True or false?

True

False

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following RAID levels incorporate(s) disk striping?

RAID 0

RAID 1

RAID 5

RAID 10

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?