SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

quiz-placeholder

Similar activities

QUIZ GAME

QUIZ GAME

University

10 Qs

Exploring Microservices Arch

Exploring Microservices Arch

University

10 Qs

Bahasa Pemograman

Bahasa Pemograman

University

10 Qs

OFFICE 365

OFFICE 365

Professional Development

10 Qs

soal pemanasan

soal pemanasan

University

20 Qs

QUIZ 2 CO

QUIZ 2 CO

University

20 Qs

Dzień Bezpiecznego Internetu

Dzień Bezpiecznego Internetu

University

10 Qs

6.การจัดการฐานข้อมูลลูกค้าออนไลน์

6.การจัดการฐานข้อมูลลูกค้าออนไลน์

University

10 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

Assessment

Quiz

Computers

University - Professional Development

Hard

Created by

Sona Mundody

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information Security Framework is built to achieve the following four goals

Confidentiality, Integrity, Availability & Accountability

Availability, Performance, Capacity and Security

Confidentiality, Integrity, Availability and Security

Availability, Performance, Accountability and Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Eavesdropping , snooping are examples for _________ attacks and denial of service, repudiation are examples for __________ attacks

active , pasive

passive, active

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify the three storage access security domains below

Application access domain

BRUA domain

Management access domain

BURA domain

Performance access domain

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Zoning and LUN masking are the techniques used for

Protecting storage infrastructure

Controlling administrative access

Controlling user access

Protecting management infrastructrure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port binding is_______________

limiting the number of devices that can attach to a particular switch port

mapping the ports of various devices to the storage arrays

restricting the switch port's type of initialization

prevent switch port from being enabled even after reboot

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port lockdown or port lockout is ______________

limiting the number of devices that can attach to a particular switch port

mapping the ports of various devices to the storage arrays

restricting the switch port's type of initialization

prevent switch port from being enabled even after reboot

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kerberos is a

network authorization protocol

network encryption protocol

network authentication protocol

network management protocol

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?