Exam 5: Network Access Control and Cloud Security
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
Network access control authenticates users logging into the network and determines what data they can access and actions they can perform.
(True/False)
4.8/5
(42)
With a ________ infrastructure, the cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
(Short Answer)
4.7/5
(32)
___________ includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, and then granting the correct level of access based on this assured identity.
(Short Answer)
4.9/5
(37)
_________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
(Short Answer)
4.9/5
(38)
A _________ is an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an autheticator attached to the other end of that link.
(Short Answer)
4.8/5
(35)
The _________ is the node that is attempting to access the network and may be any device that is managed by the network access control system
(Multiple Choice)
4.7/5
(27)
NIST defines three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and _________ as a service.
(Short Answer)
4.8/5
(32)
_________ saves the complexity of software installation, maintenance, upgrades, and patches
(Multiple Choice)
4.8/5
(29)
____________ is an EAP method for mutual authentication and session key derivation using a Pre-Shared Key.
(Short Answer)
4.9/5
(41)
EAPOL operates at the network layers and makes use of an IEEE 802 LAN, such as Ethernet or Wi-Fi, at the link level.
(True/False)
4.9/5
(41)
_________ is a client computer that is attempting to access a network
(Multiple Choice)
4.8/5
(35)
Broad network access, measured service, resource pooling, and rapid elasticity are essential characteristics of ___________
(Multiple Choice)
4.8/5
(49)
An __________ is a server computer that negotiates the use of a specific EAP method with an EAP peer, validates the EAP peer's credentials, and authorizes access to the network.
(Short Answer)
4.9/5
(36)
_________ enables customers to combine basic computing services, such as number crunching and data storage, to build highly adaptable computer systems
(Multiple Choice)
4.8/5
(38)
Cloud computing gives you the ability to expand and reduce resources according to your specific service requirement.
(True/False)
4.8/5
(26)
The Cloud Security Alliance defines _______ as the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.
(Short Answer)
4.8/5
(30)
An _________ is an access point or NAS that requires EAP authentication prior to granting access to a network.
(Short Answer)
5.0/5
(36)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)