Exam 16: Network Access Control and Cloud Security
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
___________ includes people,processes,and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified,and then granting the correct level of access based on this assured identity.
(Essay)
4.8/5
(36)
A _________ is an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an autheticator attached to the other end of that link.
(Essay)
4.7/5
(40)
A network access server does not include its own authentication services.
(True/False)
4.9/5
(36)
With a ________ infrastructure,the cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
(Essay)
4.8/5
(35)
NIST defines three service models,which can be viewed as nested service alternatives: software as a service,platform as a service,and _________ as a service.
(Essay)
4.9/5
(35)
Data must be secured while at rest,in transit,and in use,and access to the data must be controlled.
(True/False)
4.9/5
(41)
The NIST cloud computing reference architecture focuses on the requirements of "what" cloud services provide,not a "how to" design solution and implementation.
(True/False)
4.9/5
(47)
A ________ is a person,organization,or entity responsible for making a service available to interested parties.
(Multiple Choice)
4.8/5
(40)
A _________ is a person or organization that maintains a business relationship with,and uses service from,cloud providers.
(Multiple Choice)
4.8/5
(36)
With a _________ infrastructure,the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns.
(Multiple Choice)
4.8/5
(33)
For many clients,the most devastating impact from a security breach is the loss or leakage of data.
(True/False)
4.8/5
(32)
_________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
(Essay)
4.8/5
(28)
An __________ is a server computer that negotiates the use of a specific EAP method with an EAP peer,validates the EAP peer's credentials,and authorizes access to the network.
(Essay)
4.8/5
(30)
_________ is a client computer that is attempting to access a network.
(Multiple Choice)
4.7/5
(27)
With a _________ infrastructure,the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
(Multiple Choice)
4.8/5
(24)
There is a decreasing trend in organizations to move information technology operations to a cloud computing infrastructure.
(True/False)
4.8/5
(41)
____________ is an EAP method for mutual authentication and session key derivation using a Pre-Shared Key.
(Essay)
4.9/5
(39)
The _________ is the node that is attempting to access the network and may be any device that is managed by the network access control system.
(Multiple Choice)
4.9/5
(39)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)