Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Network Security Essentials
Exam 5: Network Access Control and Cloud Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
Network access control authenticates users logging into the network and determines what data they can access and actions they can perform.
Question 22
True/False
Access requestors are also referred to as clients.
Question 23
Short Answer
With a ________ infrastructure, the cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.
Question 24
Short Answer
___________ includes people, processes, and systems that are used to manage access to enterprise resources by assuring that the identity of an entity is verified, and then granting the correct level of access based on this assured identity.
Question 25
Short Answer
_________ is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Question 26
Short Answer
A _________ is an entity at one end of a point-to-point LAN segment that seeks to be authenticated by an autheticator attached to the other end of that link.
Question 27
Multiple Choice
The _________ is the node that is attempting to access the network and may be any device that is managed by the network access control system
Question 28
True/False
VLANs are common NAC enforcement methods.
Question 29
Short Answer
NIST defines three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and _________ as a service.
Question 30
Multiple Choice
_________ saves the complexity of software installation, maintenance, upgrades, and patches
Question 31
Short Answer
____________ is an EAP method for mutual authentication and session key derivation using a Pre-Shared Key.
Question 32
True/False
EAPOL operates at the network layers and makes use of an IEEE 802 LAN, such as Ethernet or Wi-Fi, at the link level.
Question 33
True/False
The threat of data compromise decreases in the cloud.
Question 34
Multiple Choice
_________ is a client computer that is attempting to access a network
Question 35
Multiple Choice
Broad network access, measured service, resource pooling, and rapid elasticity are essential characteristics of ___________
Question 36
Short Answer
An __________ is a server computer that negotiates the use of a specific EAP method with an EAP peer, validates the EAP peer's credentials, and authorizes access to the network.
Question 37
Multiple Choice
_________ enables customers to combine basic computing services, such as number crunching and data storage, to build highly adaptable computer systems
Question 38
True/False
Cloud computing gives you the ability to expand and reduce resources according to your specific service requirement.
Question 39
Short Answer
The Cloud Security Alliance defines _______ as the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.