ITN 260 FINAL EXAM REVIEW

ITN 260 FINAL EXAM REVIEW

12th Grade

60 Qs

quiz-placeholder

Similar activities

on tap cuoi ki 1 tin 12

on tap cuoi ki 1 tin 12

12th Grade

60 Qs

Apple Motion and Final Cut Pro X

Apple Motion and Final Cut Pro X

10th - 12th Grade

60 Qs

Computer Science Quiz

Computer Science Quiz

3rd - 12th Grade

59 Qs

AI Midterm

AI Midterm

9th - 12th Grade

63 Qs

EDPM TEST #1

EDPM TEST #1

9th - 12th Grade

60 Qs

What do you know about Photoshop?

What do you know about Photoshop?

10th - 12th Grade

61 Qs

Advanced HTML5 & CSS3 Part IV

Advanced HTML5 & CSS3 Part IV

9th - 12th Grade

55 Qs

Ulangan Harian

Ulangan Harian

12th Grade

60 Qs

ITN 260 FINAL EXAM REVIEW

ITN 260 FINAL EXAM REVIEW

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Samer Giulajan

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected?

  Implement a secure network gateway

  Deactivate the host OS while the guest OS is running

  Assign different virtual networks for the guest OS and host OS

  Implement virtual machine escape protection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols can be used for secure video and voice calling?

  SNMP

  SRTP

  S/MIME

  VPN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an interview, the interviewer asks you to boot a PC. A hypervisor screen appears at the start of the boot process. The interviewer then asks you to identify the type of VM monitor program being used. What should your reply be?

  Type II hypervisor

  Container

  Type I hypervisor

  Type III hypervisor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocol can be used for secure routing and switching?

  HTTPS

  HTTP

  IPsec

  DNSSEC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kane was transferring files from a file transfer protocol (FTP) server to his local machine simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and the data port is not encrypted. What protocol did Kane use to transfer the files?

FTPS

  SFTP

  TFTP

  FTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an interview, you are asked about the role played by virtual machines in load balancing. Which of the following should be your reply?

  If the virtual machine's load increases, the virtual machine can be migrated to another physical machine with more capabilities.

  If the load on a virtual machine increases, the virtual machine can balance the load by rejecting low-priority requests.

  If the load on a virtual machine increases, the RAM or disk space of the VM can be extended until the load is balanced.

  If the virtual machine's load increases, the virtual machines can balance the load by denying further access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most versatile cloud model?

  IaaS

  XaaS

  SaaS

PaaS

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?