- Which of the following are examples of Platform as a Service (PaaS)? [Choose all that apply]
Intel Mash Maker
Google App Engine
Microsoft Azure
2. Which of the following provides services, maintains the infrastructure, and provides security in a cloud environment?
Cloud Service Provider
3. Which of the following entities is contracted to manage the network, servers, and systems and provide active support in the IT functions?
Managed Service Provider (MSP)
4. In Edge computing, where is the data processed?
On the device where it originated
5. Which protocol do the thin clients use to connect to a central server?
Remote Desktop Protocol (RDP)
6. Database-as-a-service solution is an example of which of the following?
PaaS
7. Which of the following provides the underlying components to run a data center on a public cloud?
IaaS
8. Which of the following is considered a hybrid form of private clouds built and operated specifically for a targeted group?
Community Cloud
9. Which of the following is deployed on premises and intended only for the organization?
Private Cloud
10. In which of the following cloud type resources are shared amongst customers, although customers are segmented from each other?
Public Cloud
11. Which of the following combines one or more private clouds with one or more public clouds?
Hybrid Cloud
12. To prevent DNS information from being altered during transmission, which of the following protocol should you use?
DNSSEC
13. Which of the following do you protect by implementing Secure Real-Time Protocol (SRTP)?
VoIP
14. Which of the following security protocols is used by Secured file transfer protocol (SFTP)?
SSH
15. Which of the following security features are provided by Internet Protocol Security (IPsec)? [Choose all that apply]
Encryption
Authentication
Integrity
16. Which of the following protocol is used for time synchronization in a system?
NTP
17. Which of the following wireless standards can transmit data at 1300 Mbps (megabits per second) or 162.5 MBps (megabytes per second)?
802.11ac
18. Which of the following encryption key size is used by Wi-Fi Protected Access 2 (WPA2)?
128-bit
19. Which of the following security protocol is used by Protected Extensible Application Protocol (PEAP)
TLS
20. In which of the following wireless mode’s can anyone connect to the wireless network without authentication?
Open
21. In the 2.4 GHz band, which of the following channels do not overlap with the other channels? [Choose all that apply]
1
11
6
Other Links:
See other websites for quiz:
Check on QUIZLET