Skip to main content

IS5403 New Week 5

Lab 1


 where does a cloud service such as dropbox store your content? = Both of these


When examining the contents of the virtual machine created in the lab, which types were created? (Chose two)= vmx and .vm dk


Which program was used to create the virtual machine used in this lab?= None of these


which choice best describes the vCenter Converter download?= Free Product Downoload


LAB 2


It can easily be replaced


Database Security Breach Notification Act


Mitigate


Transfer

Open-source intelligence


LAB 3


802.11 g/n


WPA2-PSK


No


Yes


WPA2-PSK


802.11 g/n/ac


Which of the following are examples of Platform as a Service (PaaS)? [Choose all that apply]

Correct
 
1 of 6
2
Question

Which of the following provides services, maintains the infrastructure, and provides security in a cloud environment?

Correct
 
2 of 6
3
Question

Which of the following entities is contracted to manage the network, servers, and systems and provide active support in the IT functions?

Correct
 
3 of 6
4
Question

In Edge computing, where is the data processed?

Correct
 
4 of 6
5
Question

Which protocol do the thin clients use to connect to a central server?

Correct


1
Question

Database-as-a-service solution is an example of which of the following?

Correct
 
1 of 7
2
Question

Which of the following provides the underlying components to run a data center on a public cloud?

Correct
 
2 of 7
3
Question

Which of the following is considered a hybrid form of private clouds built and operated specifically for a targeted group?

Correct
 
3 of 7
4
Question

Which of the following is deployed on premises and intended only for the organization?

Correct
 
4 of 7
5
Question

In which of the following cloud type resources are shared amongst customers, although customers are segmented from each other?

Correct
 
5 of 7
6
Question

Which of the following combines one or more private clouds with one or more public clouds?

Correct


3
Question

To prevent DNS information from being altered during transmission, which of the following protocol should you use?

Correct
 
3 of 8
4
Question

Which of the following do you protect by implementing Secure Real-Time Protocol (SRTP)?

Correct
 
4 of 8
5
Question

Which of the following security protocols is used by Secured file transfer protocol (SFTP)?

Correct
 
5 of 8
6
Question

Which of the following security features are provided by Internet Protocol Security (IPsec)? [Choose all that apply]

Correct
 
6 of 8
7
Question

Which of the following protocol is used for time synchronization in a system?

Correct


1
Question

Which of the following wireless standards can transmit data at 1300 Mbps (megabits per second) or 162.5 MBps (megabytes per second)?

Correct
 
1 of 6
2
Question

Which of the following encryption key size is used by Wi-Fi Protected Access 2 (WPA2)?

Correct
 
2 of 6
3
Question

Which of the following security protocol is used by Protected Extensible Application Protocol (PEAP)?

Correct
 
3 of 6
4
Question

In which of the following wireless mode’s can anyone connect to the wireless network without authentication?

Correct
 
4 of 6
5
Question

In the 2.4 GHz band, which of the following channels do not overlap with the other channels? [Choose all that apply]

Correct


A cybersecurity practice of encrypting stored data to prevent unauthorized access.

Data at Rest

Question 2

A type of cloud computing service that offers essential compute, storage, and networking resources on demand, on a pay-as-you-go basis.

IaaS

Question 3

A process in which digital information is transported between locations either within or between computer systems.

Data in Motion/Data in Transit

Question 4

The process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and quality of service.

Wireless Site Survey 

Question 5

A complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications.

PaaS

Question 6

Active data which is stored in a non-persistent digital state typically in computer random-access memory (RAM), CPU caches, or CPU registers.

Data in Use/Data in Memory 

Question 7

Monitors and manages wireless access points in bulk and allows wireless devices to connect to WLAN, a wireless network architecture.

Wireless Controller

Question 8

Allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools.

SaaS

Question 9

Tool used for intercepting traffic on wireless networks

Wireless Packet Analyzer








































































































































































































Comments

Popular posts from this blog

IS5213 Data Science and Big Data Solutions

WEEK- 2 code  install.packages("dplyr") library(dplyr) Rajeshdf = read.csv('c:\\Insurance.csv') str(Rajeshdf)                        str(Rajeshdf) summary(Rajeshdf) agg_tbl <- Rajeshdf %>% group_by(Rajeshdf$JOB) %>%    summarise(total_count=n(),             .groups = 'drop') agg_tbl a = aggregate( x=Rajeshdf$HOME_VAL, by=list( Rajeshdf$CAR_TYPE), FUN=median, na.rm=TRUE ) a QUIZ 2. What famous literary detective solved a crime because a dog did not bark at the criminal? A). Sherlock Holmes 1.  In the Insurance data set, how many Lawyers are there? A).  1031 3. What two prefixes does the instructor use for variables when fixing the missing values? Select all that apply. A). IMP_ M_ 4. What is the median Home Value of a person who drives a Van? A).  204139 5. In the insurance data set, how many missing (NA) values does the variable AGE have? A) 7   1. What...

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in t...

GE5093 Design Thinking All Quizzes

  GE---5093-1D2-FA-2021 - Design Thinking Home My courses 2021-FA GE---5093-1D2-FA-2021 Week 1 Reading Quiz 1 Started on Sunday, October 31, 2021, 2:04 PM State Finished Completed on Sunday, October 31, 2021, 2:30 PM Time taken 25 mins 58 secs Grade 8.00  out of 10.00 ( 80 %) Top of Form Question  1 Correct 1.00 points out of 1.00 Flag question Question text A critical finding of Edward Lorenz related to Design Thinking was: Select one: a. An application of the caterpillar effect b. The idea of deterministic chaos or the "Butterfly Effect" c. Business leaders enjoy chaos d. Statistical modeling of weather was fairly accurate in the long term Feedback Your answer is correct. The correct answer is: The idea of deterministic chaos or the "Butterfly Effect" Question  2 Incorrect 0.00 point...