28 questions
You want to disable use of insecure protocols over an untrusted network segment. Which TCP ports might you want to block? Choose all that apply.
21
22
23
143
443
On an IPsec VPN, what protocol negotiates security associations? Choose the best response.
AH
ESP
IKE
L2TP
What security appliance is similar to a MitM attack, but designed to enhance network security rather than disrupt it? Choose the best response.
Split tunnel
SSL accelerator
SSL decryptor
VPN concentrator
What model would describe a cloud accounting service? Choose the best response.
IaaS
PaaS
SaaS
SDN
A primary benefit of employing a highly secure cloud service is that it ensures secure communications to and from the cloud. True or false?
True
False
A fully collapsed DMZ results in data to be easily transferred directly between networks, thus bypassing the DMZ completely. True or false?
True
False
Which of the following RAID levels incorporate(s) disk striping?
RAID 0
RAID 1
RAID 5
RAID 10
The process of rebuilding a RAID drive from parity data can cause a RAID drive to fail. True or false?
True
False
Which storage option is just a refinement of traditional file servers?
DAS
iSCSI
NAS
SAN
In thin disk provisioning, the entire disk space is reserved and unavailable for use by other virtual machines. True or false?
True
False
What AAA element specifies the exact resources a given principal is allowed to access? Choose the best response.
Accounting
Authentication
Authorization
Identification
What are good examples of two-factor authentication? Choose all that apply.
A credit card and a photo ID
A credit card and a security code
A credit card and a signature
A password followed by a security question
A password followed by a PIN texted to your phone
You want a system that can recognize and block an unauthorized network scan. What option should you use? Choose the best response.
Application layer firewall
IDS
IPS
Stateful firewall
As we extend our network access to a cloud environment, many traditional antivirus/anti-malware solutions no longer apply. In this case, which of the following cloud service models offers the greatest benefits?
IaaS
PaaS
SaaS
TaaS
You have a critical database server that constantly backs its files up to the cloud, but its software environment is so finicky that if it encountered a critical failure it would take a long time to get it working again. How would you describe your recovery plan for that service?
High RPO and high RTO
High RPO and low RTO
Low RPO and high RTO
Low RPO and low RTO
Which of these factors can cause automation issues? Choose all that apply.
Server name changes
Incompatibilities with automation tools
Job validation issues
Proxy server latency
Which of the following is considered to be the simplest cloud offering?
IaaS
PaaS
XaaS
SaaS
Which of the following organizations might NOT benefit from using cloud computing due to security and confidentiality concerns of their data?
Public Libraries
Food Stores
Hospitals
Post Offices
An organization with limited budget and no on-site IT staff would benefit from cloud computing
True
False
Which of the following enables an organization to maintain its strategic flexibility when implementing a SaaS solution?
Implementing SaaS before the competitors
Customizing the solution by placing logos
Monitoring and enforcing SLA
Planning an exit strategy
Which of the following cloud deployment models has the lowest upfront costs to migrate to the cloud?
Public Cloud
Outsourced private cloud
On-site private cloud
Hybrid Cloud
REST API services use for communication only HTTP protocol
True
False
__________as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be build.
SaaS
PaaS
IaaS
All of the mentioned
_________ is a cloud computing service model in which hardware is virtualized in the cloud.
SaaS
PaaS
IaaS
None of the mentioned
_______ provides virtual machines, virtual storage, virtual infrastructure, and other hardware assets.
SaaS
PaaS
IaaS
________ describes a cloud service that can only be accessed by a limited amount of people.
Data center
Private cloud
Virtualization
Public cloud
_________ is the feature of cloud computing that allows the service to change in size or volume in order to meet a user’s needs.
Scalability
Virtualization
Security
Cost-savings
Google docs is an example of
SaaS
PaaS
IaaS