Module 3 - Security Architecture

Module 3 - Security Architecture

University

25 Qs

quiz-placeholder

Similar activities

Quiz Inf X.B

Quiz Inf X.B

10th Grade - University

20 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

DWDM-2

DWDM-2

University

20 Qs

IGH Test de Entrada

IGH Test de Entrada

University

20 Qs

Relational Algebra and Calculus

Relational Algebra and Calculus

University

20 Qs

Artificial Intelligence CT-1

Artificial Intelligence CT-1

University

20 Qs

Pra UPS 2

Pra UPS 2

University

20 Qs

STM 2013 : FORMATIF T3-FORM & REPORT

STM 2013 : FORMATIF T3-FORM & REPORT

University

20 Qs

Module 3 - Security Architecture

Module 3 - Security Architecture

Assessment

Quiz

Computers

University

Hard

Created by

Sebastian Zamorano

Used 7+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?
Real-time recovery
Hot
Cold
Warm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?
Serverless framework
Type 1 hypervisor
SD-WAN
SDN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?
Clustering servers
Geographic dispersion
Load balancers
Off-site backups

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 10.50.10.25/32 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 10.50.10.25/32 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53
Access list outbound permit 0.0.0.0/0 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 10.50.10.25/32 port 53
Access list outbound permit 10.50.10.25/32 0.0.0.0/0 port 53 Access list outbound deny 0.0.0.0/0 0.0.0.0/0 port 53

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company prevented direct access from the database administrators' workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?
Jump server
RADIUS
HSM
Load balancer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
RDP server
Jump server
Proxy server
Hypervisor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?
Implementing a bastion host
Deploying a perimeter network
Installing a WAF
Utilizing single sign-on

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?