Exam 16: Network Access Control and Cloud Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

___________ includes people,processes,and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified,and then granting the correct level of access based on this assured identity.

(Essay)
4.8/5
(36)

A _________ is an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an autheticator attached to the other end of that link.

(Essay)
4.7/5
(40)

A network access server does not include its own authentication services.

(True/False)
4.9/5
(36)

With a ________ infrastructure,the cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

(Essay)
4.8/5
(35)

NIST defines three service models,which can be viewed as nested service alternatives: software as a service,platform as a service,and _________ as a service.

(Essay)
4.9/5
(35)

Data must be secured while at rest,in transit,and in use,and access to the data must be controlled.

(True/False)
4.9/5
(41)

The NIST cloud computing reference architecture focuses on the requirements of "what" cloud services provide,not a "how to" design solution and implementation.

(True/False)
4.9/5
(47)

The threat of data compromise decreases in the cloud.

(True/False)
4.7/5
(40)

A ________ is a person,organization,or entity responsible for making a service available to interested parties.

(Multiple Choice)
4.8/5
(40)

A _________ is a person or organization that maintains a business relationship with,and uses service from,cloud providers.

(Multiple Choice)
4.8/5
(36)

With a _________ infrastructure,the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns.

(Multiple Choice)
4.8/5
(33)

For many clients,the most devastating impact from a security breach is the loss or leakage of data.

(True/False)
4.8/5
(32)

_________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

(Essay)
4.8/5
(28)

An __________ is a server computer that negotiates the use of a specific EAP method with an EAP peer,validates the EAP peer's credentials,and authorizes access to the network.

(Essay)
4.8/5
(30)

_________ is a client computer that is attempting to access a network.

(Multiple Choice)
4.7/5
(27)

The __________ determines what access should be granted.

(Multiple Choice)
4.9/5
(33)

With a _________ infrastructure,the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.

(Multiple Choice)
4.8/5
(24)

There is a decreasing trend in organizations to move information technology operations to a cloud computing infrastructure.

(True/False)
4.8/5
(41)

____________ is an EAP method for mutual authentication and session key derivation using a Pre-Shared Key.

(Essay)
4.9/5
(39)

The _________ is the node that is attempting to access the network and may be any device that is managed by the network access control system.

(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)