ENDKA 3

ENDKA 3

12th Grade

24 Qs

quiz-placeholder

Similar activities

Cyber 1 Networking FINAL

Cyber 1 Networking FINAL

9th - 12th Grade

20 Qs

Examen de TIC en Turismo

Examen de TIC en Turismo

12th Grade - University

20 Qs

POST TEST BAB 1 INFORMATIKA FASE F2

POST TEST BAB 1 INFORMATIKA FASE F2

12th Grade

22 Qs

SUMMATIVE TEST IN MEDIA AND INFORMATION LITERACY

SUMMATIVE TEST IN MEDIA AND INFORMATION LITERACY

12th Grade

25 Qs

KTTX_CĐ_B_Tin12

KTTX_CĐ_B_Tin12

12th Grade - University

20 Qs

Kuis Informatika Sekarang dan Masa Depan

Kuis Informatika Sekarang dan Masa Depan

12th Grade

25 Qs

Media and Information Literacy

Media and Information Literacy

12th Grade

20 Qs

Quiz tentang Google Colab

Quiz tentang Google Colab

10th Grade - University

20 Qs

ENDKA 3

ENDKA 3

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Anel Aqtasova

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scenario illustrates the hybrid model of service delivery?

Part of the tasks is performed by the internal team and the rest is done by a third-party contractor.

All work is done by a third-party contractor abroad.

Internal staff does all the work on their own.

An external contractor works exclusively in the client's office.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RTO= 0-1 hour, RPO = 4-24. Choose the strategy depending on identified RTO and RPO:

Tape backups, active-passive clustering

Mirroring, cold standby

Tape backups, active-active clustering

Mirroring, active-active clustering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the advantage of active-active clustering mode over active-passive?

Reduced hardware costs.

More even load distribution and improved performance.

Faster recovery from an active-server failure.

Eliminating the need for system monitoring.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following metrics can be identified as: “This is a metric used in biometric security systems to measure the effectiveness of the system in identifying individuals correctly. This metric is the point at which the false acceptance rate and false rejection rate are equal”?

FAR

FER

FRR

EER

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which firewall implementation scheme consists of 1 NIC, bastion host and 1 packet filtering router?

Dual-Homed firewall

Screened-host firewall

Screened-subnet firewall

Demilitarized zone

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Application-Level firewall and at which layer of the OSI model does it operate?

Filters traffic based on user identity, operates at the presentation layer.

Provides a separate proxy for each application, operates at the application layer.

Allows traffic based on the type of connection, operates at the session layer.

Operates at the transport layer, filtering traffic based on TCP or UDP sessions.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SSID stand for?

Secure System Identifier

Service Set Identifier

Standard Signal Integration Device

Server Subnet Identification

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?