CYB 140 Wk 5 – Practice: Quiz

0 items
CYB 140 Wk 5 - Practice: Quiz
CYB 140 Wk 5 – Practice: Quiz
$5.00
  • Description

CYB 140 Wk 5 – Practice: Quiz

  1. Question 1

4/4

Which command flushes the level 1 data cache from every VM entry in the VirtualBox?

Hide answer choices

–l1a-flush-on-vm-entry

–l1b-flush-on-vm-entry

–l1c-flush-on-vm-entry

–l1d-flush-on-vm-entry

  1. Question 2

4/4

Which command will clear the affected buffer on every VM entry in the VirtualBox?

Hide answer choices

-msd-clear-on-vm-entry

-mds-clear-on-vm-entry

-dms-clear-on-vm-entry

-smd-clear-on-vm-entry

  1. Question 3

4/4

Who connects the SDN controller and SDN networking devices and relays information from network services to the network devices such as switches and routers?

Hide answer choices

Eastbound API

Westbound API

Northbound API

Southbound API

  1. Question 4

4/4

Who provides virtual machines and other abstracted hardware and operating systems, which can be controlled through a service API?

Hide answer choices

IaaS

PaaS

SaaS

CaaS

  1. Question 5

4/4

Google Docs, Salesforce CRM, Freshbooks are examples of:

Hide answer choices

IaaS

PaaS

SaaS

CaaS

  1. Question 6

4/4

Which modulation technique is used by the Local Area Wireless Network (LAWN)?

Hide answer choices

Orthogonal Frequency-Division Multiplexing (OFDM)

Direct-Sequence Spread Spectrum (DSSS)

Frequency-hopping Spread Spectrum (FHSS)

Multiple-input, Multiple Output-Orthogonal Frequency Division Multiplexing (MIMOOFDM)

  1. Question 7

4/4

What is the Service Set Identifier (SSID)?

Hide answer choices

It is a 32 alphanumeric sequence character that acts as a wireless identifier on the network.

It is a 36 alphanumeric sequence character that acts as a wireless identifier on the network.

It is a 28 alphanumeric sequence character that acts as a wireless identifier on the network.

It is a 24 alphanumeric sequence character that acts as a wireless identifier on the network.

  1. Question 8

4/4

How is the baseline for normal traffic identified?

Hide answer choices

When the FIN flag appears at the beginning and the SYN flag appears at the end of the connection

When the ACK flag appears at the beginning and the RST flag appears at the end of the connection

When the SYN flag appears at the beginning, and the FIN flag appears at the end of the connection

When the RST flag appears at the beginning and the ACK flag appears at the end of the connection

  1. Question 9

4/4

Which of the following is a virtualization-based security feature that separates business data and the underlying process?

Hide answer choices

IUM

NFV

IPAM

SMB

  1. Question 10

4/4

Which of the following security controls can provide cloud customers role-based control for critical information within the enterprise?

Hide answer choices

Network security

Cloud activity monitoring

Identity and access management

Data storage security techniques