ITN 260 FINAL EXAM REVIEW

ITN 260 FINAL EXAM REVIEW

12th Grade

60 Qs

quiz-placeholder

Similar activities

Komputer dan Jaringan Dasar

Komputer dan Jaringan Dasar

10th - 12th Grade

62 Qs

CBT

CBT

11th - 12th Grade

60 Qs

Computer ٍSkills- Chapter 3

Computer ٍSkills- Chapter 3

1st Grade - University

62 Qs

Python 3 Loops

Python 3 Loops

9th - 12th Grade

55 Qs

Los periféricos informáticos

Los periféricos informáticos

8th - 12th Grade

58 Qs

PTS Web

PTS Web

10th - 12th Grade

55 Qs

Quiz ~ Dampak Sosial Informatika

Quiz ~ Dampak Sosial Informatika

9th - 12th Grade

60 Qs

BÀI 16-20

BÀI 16-20

12th Grade

55 Qs

ITN 260 FINAL EXAM REVIEW

ITN 260 FINAL EXAM REVIEW

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Samer Giulajan

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected?

  Implement a secure network gateway

  Deactivate the host OS while the guest OS is running

  Assign different virtual networks for the guest OS and host OS

  Implement virtual machine escape protection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols can be used for secure video and voice calling?

  SNMP

  SRTP

  S/MIME

  VPN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an interview, the interviewer asks you to boot a PC. A hypervisor screen appears at the start of the boot process. The interviewer then asks you to identify the type of VM monitor program being used. What should your reply be?

  Type II hypervisor

  Container

  Type I hypervisor

  Type III hypervisor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocol can be used for secure routing and switching?

  HTTPS

  HTTP

  IPsec

  DNSSEC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kane was transferring files from a file transfer protocol (FTP) server to his local machine simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and the data port is not encrypted. What protocol did Kane use to transfer the files?

FTPS

  SFTP

  TFTP

  FTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an interview, you are asked about the role played by virtual machines in load balancing. Which of the following should be your reply?

  If the virtual machine's load increases, the virtual machine can be migrated to another physical machine with more capabilities.

  If the load on a virtual machine increases, the virtual machine can balance the load by rejecting low-priority requests.

  If the load on a virtual machine increases, the RAM or disk space of the VM can be extended until the load is balanced.

  If the virtual machine's load increases, the virtual machines can balance the load by denying further access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most versatile cloud model?

  IaaS

  XaaS

  SaaS

PaaS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?