ITN 260 FINAL EXAM REVIEW

ITN 260 FINAL EXAM REVIEW

12th Grade

60 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

63 Qs

Phrasal Verbs and Preps

Phrasal Verbs and Preps

9th - 12th Grade

60 Qs

Unit 2 Test Review - The Internet

Unit 2 Test Review - The Internet

9th - 12th Grade

61 Qs

NerdCore

NerdCore

9th - 12th Grade

55 Qs

SOHO Network Planning Goals

SOHO Network Planning Goals

12th Grade

62 Qs

2021 Sample Paper 14 (TERM 1)

2021 Sample Paper 14 (TERM 1)

11th - 12th Grade

55 Qs

Working with Files

Working with Files

8th - 12th Grade

59 Qs

Domain 2 - Network Security

Domain 2 - Network Security

10th Grade - University

55 Qs

ITN 260 FINAL EXAM REVIEW

ITN 260 FINAL EXAM REVIEW

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Samer Giulajan

Used 2+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected?

  Implement a secure network gateway

  Deactivate the host OS while the guest OS is running

  Assign different virtual networks for the guest OS and host OS

  Implement virtual machine escape protection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols can be used for secure video and voice calling?

  SNMP

  SRTP

  S/MIME

  VPN

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an interview, the interviewer asks you to boot a PC. A hypervisor screen appears at the start of the boot process. The interviewer then asks you to identify the type of VM monitor program being used. What should your reply be?

  Type II hypervisor

  Container

  Type I hypervisor

  Type III hypervisor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocol can be used for secure routing and switching?

  HTTPS

  HTTP

  IPsec

  DNSSEC

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kane was transferring files from a file transfer protocol (FTP) server to his local machine simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and the data port is not encrypted. What protocol did Kane use to transfer the files?

FTPS

  SFTP

  TFTP

  FTP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an interview, you are asked about the role played by virtual machines in load balancing. Which of the following should be your reply?

  If the virtual machine's load increases, the virtual machine can be migrated to another physical machine with more capabilities.

  If the load on a virtual machine increases, the virtual machine can balance the load by rejecting low-priority requests.

  If the load on a virtual machine increases, the RAM or disk space of the VM can be extended until the load is balanced.

  If the virtual machine's load increases, the virtual machines can balance the load by denying further access.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the most versatile cloud model?

  IaaS

  XaaS

  SaaS

PaaS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?