1.6K
Table of Contents
Additional Network Security Questions
- What is the function of a VPN?
Answer: To create a secure connection over a less secure network. - Which protocol is used to ensure secure remote login?
Answer: SSH (Secure Shell) - What does IDS stand for in network security?
Answer: Intrusion Detection System - A newly discovered vulnerability in software or hardware that is unknown to the software vendor and for which no patch or fix is available is known as?
Answer: Zero-day exploit or Zero-day vulnerability - A security process in which users provide two different forms of identification to gain access is as known as ?
Answer: Two-factor authentication (2FA)
Additional Cloud Questions
- What is the main benefit of cloud elasticity?
Answer: The ability to scale computing resources up or down as needed. - Question: What does hybrid cloud refer to?
Answer: A combination of private and public cloud environments. - What is cloud migration?
Answer: The process of moving data, applications, or other business elements to a cloud computing environment. - Which cloud service provider is known for its simple storage service (S3)?
Answer: AWS (Amazon Web Services) - What is cloud bursting and when is it used?
Answer: Cloud bursting is the practice of using cloud computing resources to handle temporary spikes in workload, preventing system overload.
Specific Questions
- What command allows you to determine whether an IP access list is enabled on a particular interface?
Answer: show ip interface - What router command will permit SMTP mail to only host 1.1.1.1?
Answer: access-list 110 permit tcp any host 1.1.1.1 eq smtp - What type of network security device scans for viruses and malware?
Answer: Antivirus scanning devices - Which cloud service provider should be chosen for extensive support of Linux, Windows Server, and SQL Server?Answer: Azure
- How can you stop automatic numbering in MS Word?
Answer: Press the Enter key twice or click the Numbering button again.