Exam 16: Network Access Control and Cloud Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

EAPOL operates at the network layers and makes use of an IEEE 802 LAN,such as Ethernet or Wi-Fi,at the link level.

Free
(True/False)
4.8/5
(27)
Correct Answer:
Verified

True

Network access control authenticates users logging into the network and determines what data they can access and actions they can perform.

Free
(True/False)
4.8/5
(38)
Correct Answer:
Verified

True

The cloud provider in a private cloud infrastructure is responsible for both the infrastructure and the control.

Free
(True/False)
4.7/5
(30)
Correct Answer:
Verified

False

___________ is an umbrella term for managing access to a network.

(Multiple Choice)
4.9/5
(30)

An _________ is an access point or NAS that requires EAP authentication prior to granting access to a network.

(Essay)
4.8/5
(41)

A cloud broker is useful when cloud services are too complex for a cloud consumer to easily manage.

(True/False)
4.9/5
(33)

Broad network access,measured service,resource pooling,and rapid elasticity are essential characteristics of ___________.

(Multiple Choice)
4.8/5
(33)

In effect,________ is an operating system in the cloud.

(Multiple Choice)
4.8/5
(44)

_________ enables customers to combine basic computing services,such as number crunching and data storage,to build highly adaptable computer systems.

(Multiple Choice)
4.8/5
(32)

The Cloud Security Alliance defines _______ as the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.

(Essay)
4.8/5
(42)

The __________ is an Internet protocol that enables dynamic allocation of IP addresses to hosts.

(Multiple Choice)
4.9/5
(44)

A _________ in an intermediary that provides connectivity and transport of cloud services from CP's to cloud consumers.

(Essay)
4.8/5
(27)

The Extensible Authentication Protocol supports multiple authentication methods.

(True/False)
4.8/5
(31)

_________ defines how the TLS protocol can be encapsulated in EAP messages.

(Essay)
4.7/5
(31)

The ___________ functions as an access control point for users in remote locations connecting to an enterprise's internal network.

(Essay)
4.9/5
(28)

A __________ provides a form of NAC by allowing or denying network traffic between an enterprise host and an external user.

(Essay)
4.8/5
(33)

VLANs are common NAC enforcement methods.

(True/False)
4.9/5
(36)

__________ are third party audits of cloud services.

(Essay)
4.9/5
(39)

A ________ is a party that can conduct independent assessment of cloud service,information sytem operations,performance,and security of the cloud implementation.

(Multiple Choice)
4.8/5
(31)

In using cloud infrastructures,the client necessarily cedes control to the CP on a number of issues that may affect security.

(True/False)
4.9/5
(29)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)