Exam 5: Network Access Control and Cloud Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Network access control authenticates users logging into the network and determines what data they can access and actions they can perform.

(True/False)
4.8/5
(42)

Access requestors are also referred to as clients.

(True/False)
4.9/5
(34)

With a ________ infrastructure, the cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

(Short Answer)
4.7/5
(32)

___________ includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, and then granting the correct level of access based on this assured identity.

(Short Answer)
4.9/5
(37)

_________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

(Short Answer)
4.9/5
(38)

A _________ is an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an autheticator attached to the other end of that link.

(Short Answer)
4.8/5
(35)

The _________ is the node that is attempting to access the network and may be any device that is managed by the network access control system

(Multiple Choice)
4.7/5
(27)

VLANs are common NAC enforcement methods.

(True/False)
4.7/5
(46)

NIST defines three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and _________ as a service.

(Short Answer)
4.8/5
(32)

_________ saves the complexity of software installation, maintenance, upgrades, and patches

(Multiple Choice)
4.8/5
(29)

____________ is an EAP method for mutual authentication and session key derivation using a Pre-Shared Key.

(Short Answer)
4.9/5
(41)

EAPOL operates at the network layers and makes use of an IEEE 802 LAN, such as Ethernet or Wi-Fi, at the link level.

(True/False)
4.9/5
(41)

The threat of data compromise decreases in the cloud.

(True/False)
4.8/5
(26)

_________ is a client computer that is attempting to access a network

(Multiple Choice)
4.8/5
(35)

Broad network access, measured service, resource pooling, and rapid elasticity are essential characteristics of ___________

(Multiple Choice)
4.8/5
(49)

An __________ is a server computer that negotiates the use of a specific EAP method with an EAP peer, validates the EAP peer's credentials, and authorizes access to the network.

(Short Answer)
4.9/5
(36)

_________ enables customers to combine basic computing services, such as number crunching and data storage, to build highly adaptable computer systems

(Multiple Choice)
4.8/5
(38)

Cloud computing gives you the ability to expand and reduce resources according to your specific service requirement.

(True/False)
4.8/5
(26)

The Cloud Security Alliance defines _______ as the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.

(Short Answer)
4.8/5
(30)

An _________ is an access point or NAS that requires EAP authentication prior to granting access to a network.

(Short Answer)
5.0/5
(36)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)