Exam 7: Cloud Computing and Remote Access
Exam 1: Introduction to Networking50 Questions
Exam 2: How Computers Find Each Other on Networks49 Questions
Exam 3: How Data Is Transported Over Networks50 Questions
Exam 4: Structured Cabling and Networking Elements50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Cloud Computing and Remote Access50 Questions
Exam 8: Network Risk Management50 Questions
Exam 9: Unified Communications and Network Performance Management50 Questions
Exam 10: Network Segmentation and Virtualization50 Questions
Exam 11: Wide Area Networks50 Questions
Exam 12: Industrial and Enterprise Networking50 Questions
Select questions type
A variant of TLS is ___________________,which provides authentication like SSL/TLS,but does not require a certificate for each user.
(Short Answer)
4.8/5
(34)
The original version of the Secure Hashing Algorithm (SHA)was developed by the NSA,and used a hash of what length?
(Multiple Choice)
4.8/5
(30)
Matching
Match each correct item with the statement below.
-In Kerberos terminology,theserver that issues keys to clients during initial clientauthentication.
(Multiple Choice)
4.8/5
(39)
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
(True/False)
4.7/5
(30)
Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.
(Essay)
4.8/5
(33)
What cloud service model involves providing applications through an online user interface,providing for compatibility with a multitude of different operating systems and devices?
(Multiple Choice)
4.8/5
(33)
When using public and private keys to connect to an SSH server,where must your public key be placed before you can connect?
(Multiple Choice)
4.9/5
(42)
What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in a direct connection,such as when a client computer connects to a server at an ISP using a dial-up or DSL connectionand modem?
(Multiple Choice)
4.9/5
(32)
A _________________ is a service that is shared between multiple organizations,but not available publicly.
(Short Answer)
4.8/5
(35)
Matching
Match each correct item with the statement below.
-A service model in which variousplatforms are provided virtually,enabling developers tobuild and test applications within virtual,online environmentstailored to the specific needs of a project.
(Multiple Choice)
4.9/5
(37)
A SecurID key chain fob from RSA security generates a password that changes how often?
(Multiple Choice)
4.9/5
(33)
What are the three tenets of the CIA triad,and how do they provide assurances that data will be protected?
(Essay)
4.9/5
(28)
How often should administrators and network users be required to change their password?
(Multiple Choice)
4.9/5
(38)
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
(True/False)
4.8/5
(34)
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
(Multiple Choice)
4.7/5
(36)
Matching
Match each correct item with the statement below.
-A service model in whichapplications are provided through an online user interfaceand are compatible with a multitude of devices and operatingsystems.
(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)