
ENDKA 3
Authored by Anel Aqtasova
Information Technology (IT)
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which scenario illustrates the hybrid model of service delivery?
Part of the tasks is performed by the internal team and the rest is done by a third-party contractor.
All work is done by a third-party contractor abroad.
Internal staff does all the work on their own.
An external contractor works exclusively in the client's office.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
RTO= 0-1 hour, RPO = 4-24. Choose the strategy depending on identified RTO and RPO:
Tape backups, active-passive clustering
Mirroring, cold standby
Tape backups, active-active clustering
Mirroring, active-active clustering
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the advantage of active-active clustering mode over active-passive?
Reduced hardware costs.
More even load distribution and improved performance.
Faster recovery from an active-server failure.
Eliminating the need for system monitoring.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following metrics can be identified as: “This is a metric used in biometric security systems to measure the effectiveness of the system in identifying individuals correctly. This metric is the point at which the false acceptance rate and false rejection rate are equal”?
FAR
FER
FRR
EER
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which firewall implementation scheme consists of 1 NIC, bastion host and 1 packet filtering router?
Dual-Homed firewall
Screened-host firewall
Screened-subnet firewall
Demilitarized zone
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an Application-Level firewall and at which layer of the OSI model does it operate?
Filters traffic based on user identity, operates at the presentation layer.
Provides a separate proxy for each application, operates at the application layer.
Allows traffic based on the type of connection, operates at the session layer.
Operates at the transport layer, filtering traffic based on TCP or UDP sessions.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does SSID stand for?
Secure System Identifier
Service Set Identifier
Standard Signal Integration Device
Server Subnet Identification
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?