321-questions_0 - Question 1(1 point Which two of the...

Info icon This preview shows pages 1–7. Sign up to view the full content.

View Full Document Right Arrow Icon
Question 1 (1 point) Which two of the following are among the major 5 actors of the NIST Cloud Computing Reference Architecture? Question 1 options: Cloud Auditor CloudShareOne Cloud Broker
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Cloud Database Question 2 (1 point) What is the block (word) size used by SHA-512 algorithm? Question 2 options: 128-bit 64-bit 32-bit 256-bit Question 3 (1 point) Which of the following can be utilized as traceroute tool? Question 3 options: nslookup TTL (Time to Live) Path Analyzer Pro pingpath Question 4 (1 point) What is a network of many hacked smartphones called? Question 4 options: phone_net botnet 4g-hacked 3gees Which version of the Linux kernal does Android rely upon?
Image of page 2
Question 5 options: 2.6 3.0 3.10 3.6 Question 6 (1 point) The Autorun feature of Removable Disks and CD Drives can be a threat to network Security. What is the best course of action to remove Autorun for Removable Disks and CD Drives in Windows? Question 6 options: Tape the USB ports Provide Users without Administrative Rights Use Group Policy Remove the CD-ROM Drive from the System Question 7 (1 point) According to the text, the three different types of Virtualization include: Question 7 options: SAN Virtualization Network Virtualization Storage Virtualization Server Virtualization Question 8 (1 point) Among all smartphones, which is most likely to be hacked? (choose all that apply) Question 8 options:
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Blackberry Windows Phone iPhone Android Question 9 (1 point) Some of the Infrastructure as a service vendors include: (choose all that apply) Question 9 options: Windows SkyDrive Amazon EC2 Go Grid Sungrid Question 10 (1 point) The psexec utility can be utilized to perform which of the following actions? Question 10 options: Get System Information List Processes Launch an Interactive Command Session Show open files Question 11 (1 point) Which of the following are Mobile Network Based Attacks? (choose all that apply) Question 11 options: Man-in-the-Middle Attacks Rogue Access Points Packet Sniffing
Image of page 4
SSL Strip Question 12 (1 point) The Management Information Base (MIB) includes which of the following? (choose all that apply) Question 12 options: Scalar and Tabular Objects File and Folder Permissions OID Numbers User Accounts Question 13 (1 point) Which of the following applies to an SSID? (choose all that apply) Question 13 options: Will be encrypted in WEP or WPA/WPA2 is utilized Is part of the frame header Is Case Sensitive Can be up to 32 characters Question 14 (1 point) Which of the following are app stores? (choose all that apply) Question 14 options: ITunes Store Fanddago Google Play BlackBerry App World Question 15 (1 point)
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Which Cloud Deployment model is a multi-tenant infrastructure shared among organizations with common characteristics? Question 15 options: Private Cloud Hybrid Cloud Public Cloud Community Cloud Question 16 (1 point) Question 16 options: Disable File and Print Sharing Block ICMP so the host cannot be detected Use TCP Wrappers Turn on the Windows Firewal Question 17 (1 point) A lack of vetting of apps can lead to which two of the following results?
Image of page 6
Image of page 7
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern