Search Header Logo

ENDKA 3

Authored by Anel Aqtasova

Information Technology (IT)

12th Grade

Used 1+ times

ENDKA 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which scenario illustrates the hybrid model of service delivery?

Part of the tasks is performed by the internal team and the rest is done by a third-party contractor.

All work is done by a third-party contractor abroad.

Internal staff does all the work on their own.

An external contractor works exclusively in the client's office.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RTO= 0-1 hour, RPO = 4-24. Choose the strategy depending on identified RTO and RPO:

Tape backups, active-passive clustering

Mirroring, cold standby

Tape backups, active-active clustering

Mirroring, active-active clustering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the advantage of active-active clustering mode over active-passive?

Reduced hardware costs.

More even load distribution and improved performance.

Faster recovery from an active-server failure.

Eliminating the need for system monitoring.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following metrics can be identified as: “This is a metric used in biometric security systems to measure the effectiveness of the system in identifying individuals correctly. This metric is the point at which the false acceptance rate and false rejection rate are equal”?

FAR

FER

FRR

EER

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which firewall implementation scheme consists of 1 NIC, bastion host and 1 packet filtering router?

Dual-Homed firewall

Screened-host firewall

Screened-subnet firewall

Demilitarized zone

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an Application-Level firewall and at which layer of the OSI model does it operate?

Filters traffic based on user identity, operates at the presentation layer.

Provides a separate proxy for each application, operates at the application layer.

Allows traffic based on the type of connection, operates at the session layer.

Operates at the transport layer, filtering traffic based on TCP or UDP sessions.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SSID stand for?

Secure System Identifier

Service Set Identifier

Standard Signal Integration Device

Server Subnet Identification

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?