Kuis Pert-4

Kuis Pert-4

Professional Development

10 Qs

quiz-placeholder

Similar activities

Google Meet - Exit Quiz

Google Meet - Exit Quiz

Professional Development

10 Qs

PDSB 210622

PDSB 210622

University - Professional Development

10 Qs

Quizz Internet

Quizz Internet

KG - Professional Development

12 Qs

How Well Do You Them?

How Well Do You Them?

Professional Development

10 Qs

Python Data Structures & Statements

Python Data Structures & Statements

Professional Development

11 Qs

PLAL Agile Onboarding

PLAL Agile Onboarding

Professional Development

10 Qs

Exam Prep 1

Exam Prep 1

Professional Development

10 Qs

2. Day 1_ITBA 10 Soal

2. Day 1_ITBA 10 Soal

KG - Professional Development

10 Qs

Kuis Pert-4

Kuis Pert-4

Assessment

Quiz

Computers

Professional Development

Hard

Created by

rohadi yusup

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

A tool that filters inbound traffic to reduce potential threats.

NIDS (network-based intrusion detection system)

Anti-malware

DLP (data loss prevention)

Firewall

2.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

Inbound traffic from an external source seems to indicate much higher rates of

communication than normal, to the point where the internal systems might be

overwhelmed. Which security solution can often identify and potentially

counter this risk?

Firewall

Turnstile

Anti-malware

Badge system

3.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

Which common cloud service model only offers the customer access to a

given application?

Lunch as a service (LaaS)

Infrastructure as a service (IaaS)

Platform as a service (PaaS)

Software as a service

4.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

The concept that the deployment of multiple types of controls provides better

security than using a single type of control.

VPN

Least privilege

Internet

Defense in depth

5.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

Gary is an attacker. Gary is able to get access to the communication wire

between Dauphine's machine and Linda's machine and can then surveil the

traffic between the two when they're communicating. What kind of attack isthis?

Side channel

DDOS

On-path

Physical

6.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

Which of the following is not a typical benefit of cloud computing services?

Reduced cost of ownership/investment

Metered usage

Scalability

Freedom from legal contraints

7.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

Barry wants to upload a series of files to a web-based storage service, so that

people Barry has granted authorization can retrieve these files. Which of the

following would be Barry's preferred communication protocol if he wanted

this activity to be efficient and secure?

SMTP (Simple Mail Transfer Protocol)

FTP (File Transfer Protocol)

SFTP (Secure File Transfer Protocol)

SNMP (Simple Network Management Protocol)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?