ITN 260 FINAL EXAM REVIEW

ITN 260 FINAL EXAM REVIEW

12th Grade

60 Qs

quiz-placeholder

Similar activities

CSS3 1st Quarterly Assessment SY23-24

CSS3 1st Quarterly Assessment SY23-24

12th Grade

60 Qs

Three-Layer Hierarchy Network Design Model

Three-Layer Hierarchy Network Design Model

12th Grade

61 Qs

CBT Practice Questions - Set 5

CBT Practice Questions - Set 5

12th Grade

60 Qs

ICDL | CYBER SECURITY

ICDL | CYBER SECURITY

12th Grade

62 Qs

MTA SecFundamentals Day 2

MTA SecFundamentals Day 2

11th - 12th Grade

59 Qs

BCS Software Languages

BCS Software Languages

12th Grade - University

59 Qs

Sensors

Sensors

9th - 12th Grade

63 Qs

ITE v7 Chap 10-14 Final Review

ITE v7 Chap 10-14 Final Review

11th - 12th Grade

63 Qs

ITN 260 FINAL EXAM REVIEW

ITN 260 FINAL EXAM REVIEW

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Samer Giulajan

Used 2+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected?

  Implement a secure network gateway

  Deactivate the host OS while the guest OS is running

  Assign different virtual networks for the guest OS and host OS

  Implement virtual machine escape protection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols can be used for secure video and voice calling?

  SNMP

  SRTP

  S/MIME

  VPN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an interview, the interviewer asks you to boot a PC. A hypervisor screen appears at the start of the boot process. The interviewer then asks you to identify the type of VM monitor program being used. What should your reply be?

  Type II hypervisor

  Container

  Type I hypervisor

  Type III hypervisor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocol can be used for secure routing and switching?

  HTTPS

  HTTP

  IPsec

  DNSSEC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kane was transferring files from a file transfer protocol (FTP) server to his local machine simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and the data port is not encrypted. What protocol did Kane use to transfer the files?

FTPS

  SFTP

  TFTP

  FTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an interview, you are asked about the role played by virtual machines in load balancing. Which of the following should be your reply?

  If the virtual machine's load increases, the virtual machine can be migrated to another physical machine with more capabilities.

  If the load on a virtual machine increases, the virtual machine can balance the load by rejecting low-priority requests.

  If the load on a virtual machine increases, the RAM or disk space of the VM can be extended until the load is balanced.

  If the virtual machine's load increases, the virtual machines can balance the load by denying further access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most versatile cloud model?

  IaaS

  XaaS

  SaaS

PaaS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?