ENDKA 3

ENDKA 3

12th Grade

24 Qs

quiz-placeholder

Similar activities

Web Design and Editing Software Quiz

Web Design and Editing Software Quiz

11th Grade - University

20 Qs

Selection of cloud technologies

Selection of cloud technologies

10th Grade - University

26 Qs

Grade 7 Storage Quiz

Grade 7 Storage Quiz

7th Grade - University

25 Qs

Big Data and Analytics: Understanding the Power of Data Analysis

Big Data and Analytics: Understanding the Power of Data Analysis

12th Grade

20 Qs

03 Compute Cloud Services (Midterm)

03 Compute Cloud Services (Midterm)

12th Grade

20 Qs

sistem komputer kelas 9

sistem komputer kelas 9

9th Grade - University

20 Qs

CompTIA Security+ Certification Exam SY0-701 Practice Test 24

CompTIA Security+ Certification Exam SY0-701 Practice Test 24

12th Grade

25 Qs

AWS Fundamentals for Grade 12 Students

AWS Fundamentals for Grade 12 Students

12th Grade

20 Qs

ENDKA 3

ENDKA 3

Assessment

Quiz

Information Technology (IT)

12th Grade

Hard

Created by

Anel Aqtasova

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scenario illustrates the hybrid model of service delivery?

Part of the tasks is performed by the internal team and the rest is done by a third-party contractor.

All work is done by a third-party contractor abroad.

Internal staff does all the work on their own.

An external contractor works exclusively in the client's office.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RTO= 0-1 hour, RPO = 4-24. Choose the strategy depending on identified RTO and RPO:

Tape backups, active-passive clustering

Mirroring, cold standby

Tape backups, active-active clustering

Mirroring, active-active clustering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the advantage of active-active clustering mode over active-passive?

Reduced hardware costs.

More even load distribution and improved performance.

Faster recovery from an active-server failure.

Eliminating the need for system monitoring.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following metrics can be identified as: “This is a metric used in biometric security systems to measure the effectiveness of the system in identifying individuals correctly. This metric is the point at which the false acceptance rate and false rejection rate are equal”?

FAR

FER

FRR

EER

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which firewall implementation scheme consists of 1 NIC, bastion host and 1 packet filtering router?

Dual-Homed firewall

Screened-host firewall

Screened-subnet firewall

Demilitarized zone

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Application-Level firewall and at which layer of the OSI model does it operate?

Filters traffic based on user identity, operates at the presentation layer.

Provides a separate proxy for each application, operates at the application layer.

Allows traffic based on the type of connection, operates at the session layer.

Operates at the transport layer, filtering traffic based on TCP or UDP sessions.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SSID stand for?

Secure System Identifier

Service Set Identifier

Standard Signal Integration Device

Server Subnet Identification

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?