Search Header Logo

34368_week_09

Authored by Mads Ehrhorn

Engineering

University

Used 1+ times

34368_week_09
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the TDC NET Cyber Defense Center?

To develop cybersecurity software

To sell cybersecurity services

To enforce compliance with GDPR

To protect critical national infrastructure by monitoring TDC NET’s network and systems

Answer explanation

The TDC NET Cyber Defense Center’s mission is to secure critical infrastructure by actively monitoring networks and systems to prevent cyber threats, ensuring a safer environment for national communications. Slide 5.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Time-Sensitive Networking (TSN), what is the purpose of frame preemption?

To delay all network traffic equally

To allow high-priority traffic to bypass low-priority traffic

To eliminate all network jitter

To reduce the network’s overall speed

Answer explanation

Frame preemption in TSN ensures that critical or high-priority data is sent with minimal delay, enabling real-time communication by letting it “preempt” lower-priority traffic. Slide 4.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cybersecurity framework does TDC NET primarily follow?

ISO 27001

NIST Cybersecurity Framework

SOC 2

CIS Controls

Answer explanation

TDC NET’s Cyber Defense Center relies on the NIST Cybersecurity Framework, particularly focusing on its Detect and Respond functions, to guide its cybersecurity measures. Slide 7.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of the Credit-Based Shaper (CBS) in Time-Sensitive Networking?

To enforce strict time slots for all traffic

To allocate bandwidth to low-priority traffic

To control and manage bandwidth for bursty and conflicting traffic fairly

To eliminate redundant data packets

Answer explanation

The Credit-Based Shaper in TSN manages network traffic, especially when bursts occur, to maintain efficient data flow without significant delay for critical applications. Page 9.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What principle does “defense in depth” rely on to protect computer systems?

One single security layer

A set of minimum security controls

Multiple redundant security layers

Complete isolation from external networks

Answer explanation

Defense in depth refers to implementing multiple layers of security to ensure that even if one layer fails, others can still protect the system from threats. Slide 10.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?