CSC 446 cloud computing assesment

Ace your homework & exams now with Quizwiz!

You are working on trouble ticket opened to address a group of off-site users who are unable to log into a cloud-based application. What user system are you troubleshooting? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Authentication B Kerberos C Federation D Authorization

A Authentication

Elena manages user accounts for her company's cloud presence. She has a trouble ticket open with Jill to assist her in accessing an SSD storage volume in the San Paulo region of the public cloud. What kind of user issue is she investigating? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Authorization B Authentication C SSO D Federation

A Authorization

Hank is researching the methods that his network operations center can use to access the Berlin hosted servers operating in a hybrid cloud configuration. Which of the following are not viable methods?Each correct answer represents a complete solution. Choose all that apply. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A DNS B SSH C RDP D Telnet E IDS/IPS

A DNS E. IDS/IPS

What is a visual representation of current cloud operations that consolidates data into an easy-to-read format? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Dashboard B Object monitor C Operational matrix D Management console

A Dashboard

As a security administrator of an enterprise data center, you need to check the operating systems that are being used in the company. You find one of the operating systems originally loads with unneeded services such as printing, various networking services such as DHCP, and an FTP server enabled. These services might expose the operating system to potential malicious activity. What will you do to harden the operating system? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Disable the services that are not in use. B Install antivirus. C Implement host-based firewall security. D Remove the services that are not in use.

A Disable the services that are not in use.

James, a cloud architect, created a new delivery controller for a large VM farm to scale up according to organizational needs. The old and new delivery controllers now form a cluster. However, the new delivery controller returns an error when entering the license code. Which of the following is the most likely cause? A Firewall B SSL C Telnet D DHCP

A Firewall

Vicky is investigating multiple hacking attempts on her cloud-based e-commerce web servers. She wants to add a front-end security system that can actively deploy countermeasures that shuts down the hacking attempts. What application would you suggest that Vicky deploy? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A IPS B RAID C HIDS D DMZ E IDS

A IPS

Which cloud-based VPN access technology is used for secure access from your corporate data center to the cloud that offers data integrity and confidentiality? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A IPSec B RC5 C AES D 3DES

A IPSec

What options can you offer your user base for multifactor authentication tokens?Each correct answer represents a complete solution. Choose two. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Key fob B Automation systems C Smartphone app D Python app E Cloud vendor management dashboard

A Key fob C Smartphone app

James goes to his local bank and inserts his card into the ATM and then enters his PIN on the keypad. What type of authentication is he participating in? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Multifactor B IDS C Mutual D Single sign-on

A Multifactor

Harley is a systems architect for a large manufacturing firm. While testing a new application that will be deployed in an IaaS-based public cloud, he builds a test image and deploys a test VM in his development virtual private cloud zone. When he restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage did he implement?Each correct answer represents a complete solution. Choose all that apply. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Nondurable B Ephemeral C RAID D Durable E Object F Block

A Nondurable B Ephemeral

Linda works in the IT security group of her firm and has been tasked to investigate options that will allow customers to securely access their personal records stored on the cloud deployment accessed via tablets. What is the most common in-flight e-commerce security posture in the market? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A SSL/TLS B IPsec C VPN D MD5

A SSL/TLS

Which document outlines your company's responsibilities to securely deploy your fleet of servers in the public cloud? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Security policy B Baseline C SOC 2 D SLA

A Security policy

You are a web server administrator of your company. You want to authenticate the end user for all the applications the user has been given rights to and eliminates further prompts when the user switches applications during the same session. Which approach of access control should you use? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Single sign-on B Role-based access control C Mandatory access control D Multifactor authentication

A Single sign-on

A bank's ATM machine is an example of what type of authentication? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Two-factor B LDAP C User based D SSO

A Two-factor

Which of the following encryption systems use symmetric key algorithm?Each correct answer represents a complete solution. Choose all that apply. A AES B RSA C 3DES D RC4

A AES C 3DES D RC4

A web-based dashboard is being deployed by your company. Hank has been tasked to develop the application but is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for him to use to meet his requirements? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A API B GUI C JSON D CLI

A API

What technology can allow code to replace many of the processes that had to be performed manually in the past? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Automation B Scripting C XML D Python

A Automation

To secure a data center interconnect between your company's Sydney and Berlin regions, you are being asked what a common solution is that allows interoperability between the various vendors' firewalls and routers in each region. What is a good solution for securing interconnects over the Internet and between dissimilar hardware and software security devices? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A IPsec B RC5 C AES D SOC-3

A IPsec

Roman is the cloud administrator for a company that stores object-based data in a hybrid cloud. Because of the sensitivity of the data and various regulatory restrictions on allowing users access to sensitive security data, what type of access control would meet his security policies? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Mandatory access control B Multifactor C Roles D Nondiscretionary

A Mandatory access control

A company that provides a cloud-based storage solution for consumers needs to ensure that users' data is encrypted while it is stored on its premises. Which of the following should be used to accomplish this task? A SSL B PKI C ARP D IPSec

A SSL

Which HTTP security implementation is used in e-commerce web servers? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A SSL B IPSec C ARP D 3DES

A SSL

In an IaaS environment, the security team issues a new signature file to prevent specific malware threats from infiltrating the company network. Which of the following describes where the security team should deploy the updated signatures? A WAF B IDS C DMZ D SSH

A WAF

AES (Advanced Encryption Standard):

A symmetrical block cipher that implements multiple hash functions for protecting and encrypting the data

Jennifer, a cloud administrator, is required to implement a solution to handle data-at-rest encryption requirements for a database. Which of the following would be the best to satisfy these requirements? A Create a virtual encrypted disk, add it to the virtual server, and have the database write to it. B Enable two-factor authentication on connections to the database server and log activities. C Activate memory encryption on the virtual server and store the certificates remotely. D Install an SSL certificate and only allow secure connections to the server.

A. Create a virtual encrypted disk, add it to the virtual server, and have the database write to it.

Which of the following security services are installed inline in a network so that all traffic must pass through it as it transits from one network to another? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Firewalls B Antivirus and Malware Prevention C Intrusion Detection and Prevention

A. Firewalls

Emily inserts her ATM card into the ATM machine and then enters her PIN on the keypad. What type of authentication is she using? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Multifactor B SSO C LDAP D User-based

A. Multifactor

Which software package automates cloud security in a single package? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Orchestration B API C Scripting D JSON

A. Orchestration

Who is responsible for host-based intrusion detection and prevention systems for PaaS and SaaS? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Provider B Automation vendor C DevOps D Customer

A. Provider

Your company has purchased a specialized intrusion prevention system that is virtualized and designed for cloud-based network micro-segmentation deployments. When reading the documentation, Siri notices a link to download a Java-based application to monitor and configure the IPS application. What kind of automation system is this? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Vendor-based B GUI C CLI D RESTful E API

A. Vendor-based

James is becoming familiar with the interfaces available for his operations team to access his hybrid cloud deployment. You have been asked to explain the common types of user-based interfaces available to manage cloud objects. What are the common interfaces you would explain to James?Each correct answer represents a complete solution. Choose three. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Web console B SNMP C API D PaaS E CLI

A. Web Console C. API E. CLI

RSA (Rivest, Shamir, and Adleman):

An asymmetrical encryption that uses a private and public key to build an encrypted connection for exchanging

James, a network administrator, is implementing a private cloud that will be used as a test environment. To limit the number of guests per subnet to a maximum of 14, he implemented a /20 network. Which of the following should he use to assign the networks? A DNS B DHCP C IPSec D NAT

B DHCP

You are being asked by your company's network operations center about visibility into a newly implemented hybrid cloud deployment. After consulting with the OPS center, you configure a web-based interface that shows all critical operations at the public cloud. What is this referred to as? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Gemalto system B Dashboard C Vendor-based security appliance D Puppet automation

B Dashboard

Bill is a security engineer at your firm and is involved in a multifactor authentication project. What options do you suggest he offer to his user base to access their login tokens? Each correct answer represents a complete solution. Choose all that apply. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Cloud vendor management dashboard B Keyfob C Automation systems D Smartphone app E Python app

B Keyfob D Smartphone app

Which of the following abstracts and hides much of the service provisioning complexity of modern cloud systems from end users? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A REST B Orchestration C Workflow D Runbook

B Orchestration

Which of the following is an update that fixes a known bug or issue? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Workflow automation B Patch C Version update D Runbook

B Patch

Your customer is asking about strengthening their authentication security by implementing a system that requires each user who logs into the system to present something you know and something you possess. What is this type of authentication called? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Active Directory/LDAP B Multifactor C Single sign-on D Kerberos

B Multifactor

Randy is developing a new application that will be deployed in an IaaS-based public cloud. He builds a test image and deploys a test VM in his private cloud's development zone. When he restarts one of the Linux-based servers, he notices that his storage volume data is missing. What type of storage did he implement?Each correct answer represents a part of the solution. Choose all that apply. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Block B Nondurable C Ephemeral D RAID E Durable F Object

B Nondurable C Ephemeral

Several SaaS providers support identity federation for authentication. Which of the following would be the best to assist in enabling federation? A GRE B SAML C SSO D PKI

B SAML

A public cloud provider recently updated one of its services to provide a new type of application load balancer. The cloud administrator is tasked with building out a proof-of-concept using this new service type. The administrator sets out to update the scripts and notices the cloud provider does not list the load balancer as an available option type for deploying this service. Which of the following is the most likely reason? A The administrator is not using the correct cloud provider account. B The administrator needs to update the version of the CLI tool. C The administrator needs to write a new script function to call this service. D The administrator can deploy the new load balancer via the cloud provider's web console.

B The administrator needs to update the version of the CLI tool.

Louis is a DevOps engineer and is exploring the different options available to him to automate VM troubleshooting in a private cloud. What are common interfaces that you would suggest he investigate?Each correct answer represents a complete solution. Choose three. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A SNMP B API C PaaS D CLI E GUI

B. API D CLI E GUI

What technology has been instrumental in the growth of on-demand cloud services? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Authentication B Automation C Python D XML E Encryption F Workflow services G Scripting

B. Automation

Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A BIOS B CPU C IPsec D I/O E DMA

B. CPU

A company wants to ensure that their cloud infrastructure is secure but fully available. They want to be alerted in the event of a security breach, but chose a response for each alert. Which of the following solutions would meet these requirements? A HTTP B IDS C DMZ D WPAN

B. IDS

Bill wants to encrypt his company's data such that the encryption provides integrity, confidentiality, and authentication of data on the TCP/IP network. What encryption technology should he use? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Secure Sockets Layer B IP Security C Advanced Encryption Standard D Transport Layer Security

B. IP Security

Which of the following monitors the malicious activity and actively takes countermeasures to eliminate or reduce the effects of the intrusion? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A SSL B IPS C SSH D DMZ

B. IPS

Ronald is a Cloud+ student studying systems that automate cloud security in a single package and provide cloud asset discovery that can be scanned, and a vulnerability assessment can be completed on all of the cloud services. What is Ronald learning about? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A REST/API B Orchestration C Workflow D Runbooks

B. Orchestration

Which of the following protocols communicates between devices over HTTP/HTTPS? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A SMTP B REST C GRE D IPSec

B. REST

A company is undertaking a large project to migrate all accounting operations to a hybrid cloud model. You are being asked about firewall and DDoS security requirements in the Dallas region of the cloud. What document should you create to define your company's requirements for this deployment? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A DIACAP B Security policy C Service level agreement D SOC-2

B. Security policy

Which of the following low-level security methods do the cloud provider use on their storage area network and storage head-end controllers?Each correct answer represents a complete solution. Choose two. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A PKI B VSAN C ACL D LUN masking

B. VSAN D. LunMasking

A new federal regulation has been released that requires stringent new encryption requirements for data at rest. You are investigating different types of data security protection technologies. What is the best encryption option for this requirement? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A 3DES B Rivest Cipher 5 C AES-256 D RSA

C AES-256

Company users are complaining that they cannot log in to a cloud-based collaboration system. The operations center has been investigating and has, so far, verified that the MFA applications are operational. What user system are they troubleshooting? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Federation B Authorization C Authentication D Kerberos

C Authentication

Tim just logged into his cloud management dashboard to check the health monitors of his server fleet. What is the process he completed at login? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Identity access B Federation C Authentication D Accounting E Authorization

C Authentication

A company security policy mandates education and training for new employees. The policy must include the controls attempt to get the system back to normal if any damage caused by an incident. Given these requirements, which of the following security controls is best suited? A Preventive B Detective C Corrective D Physical

C Corrective

Jillian works in the operations center and is tasked with monitoring security operations. What cloud-based GUI can she use for a real-time overview of security operations? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Puppet automation B Gemalto system C Dashboard D Vendor-based security appliance

C Dashboard

A new security directive has been issued that requires active preventative measures be taken during an attempted security breach. What system can monitor malicious activity and actively deploy countermeasures to shut down the hacking attempts as they occur? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A DMZ B IDS C IPS D RAID E HIDS

C IPS

Which of the following detects hacking attempts and actively takes countermeasures to shut down the connections? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A DMZ B IDS C IPS D SSH

C IPS

James has allowed access to a development server for certain hours of the day, granting another user complete control over a server fleet or storage system for administrative purposes. What type of access control is this? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Role-Based Access Control B Discretionary Access Control C Nondiscretionary Access Control D Mandatory Access Control

C Nondiscretionary Access Control

Storage that does not survive a virtual machine removal is referred to as what classification?Each correct answer represents a complete solution. Choose all that apply. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Private B Public C Nondurable D Ephemeral

C Nondurable D Ephemeral

Which of the following would a company implement to provide authentication to multiple websites that are delivered through PaaS? A IPSec B DHCP C RBAC D NAT

C RBAC

Brad has been tasked with encrypting data in flight into his e-commerce presence in a community cloud. He is investigating a standards-based secure solution that web customers can easily implement to ensure secure transactions. What is a good solution that you would recommend to Brad? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A ARP B 3DES C SSL D IPSec

C SSL

Beatriz stops at her bank's ATM on her way home from work. She inserts her card into the ATM and then enters her PIN on the keypad. What type of authentication is she using? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A User-based B LDAP C Two-factor D SSO

C Two-factor

Who is responsible for all regulatory and security compliance requirements for a cloud deployment when implementing operations in the cloud? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Service provider B Cloud provider C Cloud customer D Third-party agency

C Cloud customer

What is a visual representation of current cloud operations? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Operational matrix B Management console C Dashboard

C Dashboard

Which of the following automation tools is a defined means to programmatically access, control, and configure a device between different and discrete software components? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Web Graphical User Interface B Command Line C Application Programming Interface D Vendor-Based Solution

C. Application programming interface (API)

David, a cloud engineer, is tasked to provide security to the network traffic by ensuring data confidentiality, data integrity, sender and recipient authentication and replay protection. Which of the following will help him to accomplish the task? A DHCP B FTP C IPSec D HTTPS

C. IPSec

A critical application has sensitive data stored in cloud-based object storage in three Canadian public cloud regions. Because of regulatory requirements, a high-security user access solution is required that needs explicitly defined user groups that are allowed to modify specific objects. You are asked to provide a solution that meets these requirements. What would you suggest they implement? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Roles B Multifactor C Mandatory access control D Nondiscretionary

C. Manadatory Access Control

Allison is working on her company's new e-commerce rollout at a large public cloud provider. She wants to secure all web traffic between the client and her site when a user proceeds to checkout and places orders. What security protocol would she be implementing? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A VPN B IPsec C SSL/TLS D MD5

C. SSL/TLS

Which of the following types of deployment is referred to as a multi-availability zone architecture? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Computing segmentation B Multifactor segmentation C Storage segmentation D Cloud segmentation

D Cloud segmentation

Which of the following is an access control method in which access rights are granted to, or restricted from, users based on which roles they perform in an organization? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Mandatory B Nondiscretionary C Discretionary D RBAC

D RBAC

Robert is configuring a new cloud interconnect to access his locally hosted Active Directory services. He wants to prevent his user base from having fragmented rights and no unified authorization services. You are brought in as a service consultant to assist in optimizing and controlling user access by implementing a technology that will give access to all allowed systems at the time of user authentication. He is implementing the LDAP protocol to enable this service. What type of system are you deploying? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Token-based 2FA B Nondiscretionary C RSA D SSO

D SSO

Which of the following allows a user to log in just one time and be granted access rights to multiple systems? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A 3DES B IPSec C SSL D SSO

D SSO

Fluentes is a security consultant for a day trading company that must implement strong encryption of data at rest for their cloud storage tiers. What is the best option that meets most security regulations for the encryption of stored data? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Rivest Cipher 5 B 3DES C RSA D AES-256

D AES-256

Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A RBAC B Nondiscretionary C Discretionary D Mandatory

D Mandatory

Which of the following is a method of providing device communications over IP networks? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A SSO B PKI C GRE D REST

D REST

William is implementing an access control rollout for a cluster of Windows SQL database servers in a hybrid cloud environment. He has defined the required tasks and then puts users, groups, and servers into this task-based implementation. What type of access control should William deploy? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Multifactor B Mandatory access control C Nondiscretionary D Roles

D Roles

A web-based dashboard is being deployed by a company. James has been tasked to develop an application but is concerned that the application must pull data from many different cloud locations and devices. Which is a good interface for him to meet his requirements? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A GUI B JSON C CLI D API

D. API

Which of the following is a text-based interface tool used to configure, manage, and troubleshoot devices? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A GUI B JSON C API D CLI

D. CLI

Which of the following is configured to stop suspicious or unsolicited incoming traffic, but allow incoming traffic sent as a response to requests from internal hosts? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A SSL B Telnet C DHCP D Firewall

D. Firewall

James, a network administrator, wants to detect possible malicious incursions into a network to monitor and audit suspected and known attack signatures and behavior. Which of the following will help him? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A DMZ B WPAN C HTTP D IDS

D. IDS

Perry is investigating options for interconnecting a private cloud to a new public cloud region that supports analysis of customer-streamed IoT data. She is planning on implementing a tunnel across the Internet to interconnect the two locations to avoid the high costs of a dedicated interconnection. What transport protocol would you suggest that can offer a secure connection across the unsecure Internet? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A SOC-3 B AES C RC5 D IPSec

D. IPSec

Which of the following protocols allows a PC or network to access a remote network such as your cloud-based database? A RDP B ARP C Kerberos D PPTP

D. PPTP

John is a software developer working on a program that will be cloud compatible and implements a machine-to-machine interconnection coupling two applications in a tiered cloud stack. You have been brought in as a Cloud+ certified consultant to assist on the project. Which of the following software interfaces would you recommend to John? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A XML B Python C TLS D SNMP E API

E API

Mindy has been tasked to develop a new QA test logging application but is concerned that the application must pull data from many different cloud locations and devices. What is a good interface for her to use to meet her requirements? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A XML B Python C TLS D SNMP E API

E. API

When installing a new virtualized intrusion prevention system that is designed for cloud-based network micro-segmentation deployments, the management application requires you to download a Java configuration utility. What kind of automation system is this? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A GUI B CLI C RESTful D API E Vendor based

E. Vendor based

RC4 (Rivest Cipher 4)

Encrypts and decrypts data stream using a shared key and protects wireless connections and web transactions


Related study sets

Entrepreneurship Chapter 10 Review

View Set

7th grade Life Science Organelles

View Set

Chapter 20 Section 2 The Harding Presidency

View Set

Openstax Sociology Midterm Review Chapters 1-10

View Set