IS5403 New Week 5

  1. Which of the following are examples of Platform as a Service (PaaS)? [Choose all that apply]

Intel Mash Maker
Google App Engine
Microsoft Azure

2. Which of the following provides services, maintains the infrastructure, and provides security in a cloud environment?

Cloud Service Provider

3. Which of the following entities is contracted to manage the network, servers, and systems and provide active support in the IT functions?

Managed Service Provider (MSP)

4. In Edge computing, where is the data processed?

On the device where it originated

5. Which protocol do the thin clients use to connect to a central server?

Remote Desktop Protocol (RDP)

6. Database-as-a-service solution is an example of which of the following?

PaaS

7. Which of the following provides the underlying components to run a data center on a public cloud?

IaaS

8. Which of the following is considered a hybrid form of private clouds built and operated specifically for a targeted group?

Community Cloud

9. Which of the following is deployed on premises and intended only for the organization?

Private Cloud

10. In which of the following cloud type resources are shared amongst customers, although customers are segmented from each other?

Public Cloud

11. Which of the following combines one or more private clouds with one or more public clouds?

Hybrid Cloud

12. To prevent DNS information from being altered during transmission, which of the following protocol should you use?

DNSSEC

13. Which of the following do you protect by implementing Secure Real-Time Protocol (SRTP)?

VoIP

14. Which of the following security protocols is used by Secured file transfer protocol (SFTP)?

SSH

15. Which of the following security features are provided by Internet Protocol Security (IPsec)? [Choose all that apply]

Encryption

Authentication

Integrity

16. Which of the following protocol is used for time synchronization in a system?

NTP

17. Which of the following wireless standards can transmit data at 1300 Mbps (megabits per second) or 162.5 MBps (megabytes per second)?

802.11ac

18. Which of the following encryption key size is used by Wi-Fi Protected Access 2 (WPA2)?

128-bit

19. Which of the following security protocol is used by Protected Extensible Application Protocol (PEAP)

TLS

20. In which of the following wireless mode’s can anyone connect to the wireless network without authentication?

Open

21. In the 2.4 GHz band, which of the following channels do not overlap with the other channels? [Choose all that apply]

1

11

6

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *