Exam 5: Network Access Control and Cloud Security
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
_________ defines how the TLS protocol can be encapsulated in EAP messages.
Free
(Short Answer)
4.7/5
(38)
Correct Answer:
EAP-TLS
_________ is the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
The __________ determines what access should be granted
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
B
A network access server does not include its own authentication services.
(True/False)
4.7/5
(33)
A _________ is a person or organization that maintains a business relationship with, and uses service from, cloud providers
(Multiple Choice)
4.9/5
(32)
The NIST cloud computing reference architecture focuses on the requirements of "what" cloud services provide, not a "how to" design solution and implementation.
(True/False)
4.8/5
(34)
The ___________ functions as an access control point for users in remote locations connecting to an enterprise's internal network.
(Short Answer)
4.9/5
(40)
A _________ in an intermediary that provides connectivity and transport of cloud services from CP's to cloud consumers.
(Short Answer)
5.0/5
(36)
The __________ is an Internet protocol that enables dynamic allocation of IP addresses to hosts
(Multiple Choice)
4.7/5
(40)
Data must be secured while at rest, in transit, and in use, and access to the data must be controlled.
(True/False)
4.9/5
(43)
__________ methods are the actions that are applied to ARs to regulate access to the enterprise network.
(Short Answer)
5.0/5
(32)
The cloud provider in a private cloud infrastructure is responsible for both the infrastructure and the control.
(True/False)
4.8/5
(37)
For many clients, the most devastating impact from a security breach is the loss or leakage of data.
(True/False)
4.8/5
(39)
In using cloud infrastructures, the client necessarily cedes control to the CP on a number of issues that may affect security.
(True/False)
4.7/5
(40)
With a _________ infrastructure, the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns
(Multiple Choice)
4.8/5
(30)
A ________ is a party that can conduct independent assessment of cloud service, information sytem operations, performance, and security of the cloud implementation
(Multiple Choice)
4.9/5
(39)
___________ is an umbrella term for managing access to a network
(Multiple Choice)
4.9/5
(33)
With a _________ infrastructure, the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services
(Multiple Choice)
4.7/5
(24)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)