Exam 16: Network Access Control and Cloud Security
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
EAPOL operates at the network layers and makes use of an IEEE 802 LAN,such as Ethernet or Wi-Fi,at the link level.
Free
(True/False)
4.8/5
(27)
Correct Answer:
True
Network access control authenticates users logging into the network and determines what data they can access and actions they can perform.
Free
(True/False)
4.8/5
(38)
Correct Answer:
True
The cloud provider in a private cloud infrastructure is responsible for both the infrastructure and the control.
Free
(True/False)
4.7/5
(30)
Correct Answer:
False
___________ is an umbrella term for managing access to a network.
(Multiple Choice)
4.9/5
(30)
An _________ is an access point or NAS that requires EAP authentication prior to granting access to a network.
(Essay)
4.8/5
(41)
A cloud broker is useful when cloud services are too complex for a cloud consumer to easily manage.
(True/False)
4.9/5
(33)
Broad network access,measured service,resource pooling,and rapid elasticity are essential characteristics of ___________.
(Multiple Choice)
4.8/5
(33)
_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adaptable computer systems.
(Multiple Choice)
4.8/5
(32)
The Cloud Security Alliance defines _______ as the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.
(Essay)
4.8/5
(42)
The __________ is an Internet protocol that enables dynamic allocation of IP addresses to hosts.
(Multiple Choice)
4.9/5
(44)
A _________ in an intermediary that provides connectivity and transport of cloud services from CP's to cloud consumers.
(Essay)
4.8/5
(27)
The Extensible Authentication Protocol supports multiple authentication methods.
(True/False)
4.8/5
(31)
_________ defines how the TLS protocol can be encapsulated in EAP messages.
(Essay)
4.7/5
(31)
The ___________ functions as an access control point for users in remote locations connecting to an enterprise's internal network.
(Essay)
4.9/5
(28)
A __________ provides a form of NAC by allowing or denying network traffic between an enterprise host and an external user.
(Essay)
4.8/5
(33)
A ________ is a party that can conduct independent assessment of cloud service,information sytem operations,performance,and security of the cloud implementation.
(Multiple Choice)
4.8/5
(31)
In using cloud infrastructures,the client necessarily cedes control to the CP on a number of issues that may affect security.
(True/False)
4.9/5
(29)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)