- Description
CYB 140 Wk 5 – Practice: Quiz
- Question 1
4/4
Which command flushes the level 1 data cache from every VM entry in the VirtualBox?
Hide answer choices
–l1a-flush-on-vm-entry
–l1b-flush-on-vm-entry
–l1c-flush-on-vm-entry
–l1d-flush-on-vm-entry
- Question 2
4/4
Which command will clear the affected buffer on every VM entry in the VirtualBox?
Hide answer choices
-msd-clear-on-vm-entry
-mds-clear-on-vm-entry
-dms-clear-on-vm-entry
-smd-clear-on-vm-entry
- Question 3
4/4
Who connects the SDN controller and SDN networking devices and relays information from network services to the network devices such as switches and routers?
Hide answer choices
Eastbound API
Westbound API
Northbound API
Southbound API
- Question 4
4/4
Who provides virtual machines and other abstracted hardware and operating systems, which can be controlled through a service API?
Hide answer choices
IaaS
PaaS
SaaS
CaaS
- Question 5
4/4
Google Docs, Salesforce CRM, Freshbooks are examples of:
Hide answer choices
IaaS
PaaS
SaaS
CaaS
- Question 6
4/4
Which modulation technique is used by the Local Area Wireless Network (LAWN)?
Hide answer choices
Orthogonal Frequency-Division Multiplexing (OFDM)
Direct-Sequence Spread Spectrum (DSSS)
Frequency-hopping Spread Spectrum (FHSS)
Multiple-input, Multiple Output-Orthogonal Frequency Division Multiplexing (MIMOOFDM)
- Question 7
4/4
What is the Service Set Identifier (SSID)?
Hide answer choices
It is a 32 alphanumeric sequence character that acts as a wireless identifier on the network.
It is a 36 alphanumeric sequence character that acts as a wireless identifier on the network.
It is a 28 alphanumeric sequence character that acts as a wireless identifier on the network.
It is a 24 alphanumeric sequence character that acts as a wireless identifier on the network.
- Question 8
4/4
How is the baseline for normal traffic identified?
Hide answer choices
When the FIN flag appears at the beginning and the SYN flag appears at the end of the connection
When the ACK flag appears at the beginning and the RST flag appears at the end of the connection
When the SYN flag appears at the beginning, and the FIN flag appears at the end of the connection
When the RST flag appears at the beginning and the ACK flag appears at the end of the connection
- Question 9
4/4
Which of the following is a virtualization-based security feature that separates business data and the underlying process?
Hide answer choices
IUM
NFV
IPAM
SMB
- Question 10
4/4
Which of the following security controls can provide cloud customers role-based control for critical information within the enterprise?
Hide answer choices
Network security
Cloud activity monitoring
Identity and access management
Data storage security techniques