This type of encryption uses one key to encrypt and decrypt.
With____, you rent IT infrastructure servers and VMs, storage, networks, opertaing systems form cloud provider on pay-as-you-go basis.
Platform as a Service (PaaS)
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Security as a Service ( SECaaS)
2)This type of encryption uses one key to encrypt and decrypt.
All the listed choices are correct
Asymmetric encryption
Symmetric encryption
Hashing
3) What is the most important date security measure you can take for mobile devices?
Data backup
Two factor authentications
Use of VPN
Full hard drive encryption
4)Which layer of the OSI Model ensures that the packets are received without errors and in the correct order?
Transport layer
Data-linked layer
Session layer
Network layer
5) This is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure allowing the organization to extend the reach of their security policies beyond their own infrastructure.
Cloud Access Security Broker (CASB)
Intrusion Detection System (IDS)
DNS server
Web Application Firewall (WAF)
6) A _______ typically establishes a barrier between a trusted, secure internal network and another outside network, such as the internet, that is assumed to not be secure or trusted.
Firewall
Network Intrusion Detection System
Edge router
Virtual private network (VPN)
7) _______ is an integrity control
None of the listed choices are correct
Public Key infrastructure
Hashing
Encryption
8) Which of the following is one of the most effective data protection methods for both data-in-transit and data-at-rest?
MD5 Hashing
Encryption
Transport Layer Security (TLS)
Digital Certificates
9) This strategy combines something you have, something you know, or something you are in the authentication process.
Least Privilege Principle
Multifactor Authentication
Authenticator Management
Identity management.
10) This defines the process of granting permission to a user or object to perform or obtain something?
Authentication
Auditing
Authorization
Access Control Restrictions
11) You are using asymmetric encryption to send a private message. Which key would you use to encrypt the message?
Recipient’s private key
Sender’s private key
Recipients’ public key
Sender’s public key
12) Which of the following security controls is used to extend the network perimeter with the use of encapsulation and encryption?
Network intrusion detection system (NIDS)
Network Address Translation (NAT)
Virtual Private Network (VPN)
Web proxy
13) Which access control model provides access control based on the position or responsibility an individual fills within an organization?
Mandatory Access control
Attribute-based Access control
Discretionary Access Control
Role-based Control
14)Which access control model is the least restrictive model, popular in situations where resource owners need to allow access and privileges OnDemand?
Role-based Access Control
Mandatory Access control
Attribute- based access control
Discretionary access control
15) Access control auditing to track and report on user activity supports the following purposes:
Compliance and security reporting
SIEM use cases
Compliance and Security Reporting plus SIEM Use Cases
Identity management
16) VPNs operate at which layer of the OSI model?
Layer 5: Session layer
Layer 3: Network layer
Layer 2: Data-link layer
Layer 4: Transport layer
17) Which access control model is most flexible and fine grained of all access control types. Access can be granted by IP address, time, dates, resources, objects, privileges, or any combination?
Discretionary Access Control
Mandatory Access control
Attribute-based Access Control
Role-base Access control
18) You are analyzing a packet and see that it was being routed using a media access control (MAC) address. At which layer of the OSI model was the packet captured?
Network layer
Session layer
Data-link layer
Transport layer
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
