1.
Which of the following is a characteristics of IaaS?
Correct Answer
B. Resources are distributed as a service.
Explanation
IaaS stands for Infrastructure as a Service. It is a cloud computing model where resources such as virtual machines, storage, and networking are provided to users over the internet. The characteristic of IaaS mentioned in the correct answer is that resources are distributed as a service. This means that users can access and use these resources on-demand, without having to worry about managing the underlying infrastructure. They can scale their resources up or down as needed and pay only for what they use. This model allows for flexibility and cost savings for businesses.
2.
What does IaaS stands for?
Correct Answer
D. Infrastructure as a Service
Explanation
IaaS stands for Infrastructure as a Service. This term refers to a cloud computing model where the infrastructure, including servers, storage, and networking components, is provided by a third-party provider. With IaaS, organizations can access and use these resources on-demand, without the need to invest in and manage their own physical infrastructure. This allows for flexibility, scalability, and cost-effectiveness in deploying and managing IT resources.
3.
Which of the following is the document that list the expectations among two or more parties regarding service quality, priorities, and responsibilities
Correct Answer
A. SLA
Explanation
An SLA (Service Level Agreement) is a document that outlines the expectations and agreements between two or more parties regarding service quality, priorities, and responsibilities. It defines the level of service that will be provided, including metrics such as response time, uptime, and resolution time. It also specifies the consequences if the agreed-upon service levels are not met. Therefore, SLA is the correct answer as it accurately describes the document that lists the expectations among parties regarding service quality, priorities, and responsibilities.
4.
Which of the following are the overabundance cost of IaaS providers? (Choose Three)
Correct Answer(s)
A. Rental
B. Metering
D. Licensing
Explanation
The overabundance costs of IaaS providers include rental, metering, and licensing. Rental refers to the cost of renting infrastructure from the provider. Metering involves the cost of measuring and monitoring resource usage. Licensing refers to the fees associated with using licensed software or applications provided by the IaaS provider. These three costs contribute to the overall expenses incurred when using IaaS services.
5.
PKI - to sign and encrypt content imported and exported between servers
PKI stands for
Correct Answer(s)
Public Key Infrastructure
Explanation
PKI is a system that is used to sign and encrypt content between servers. It provides a secure way to exchange information by using public and private key pairs. The public key is used to encrypt the content, while the private key is used to decrypt it. This ensures that only the intended recipient can access the encrypted data. Additionally, PKI also provides a way to verify the authenticity of the sender through digital signatures. Therefore, PKI is the correct answer for the given question.
6.
DRM- to control how exported content might be viewed, edited and redistributed
DRM stands for
Correct Answer(s)
Digital Rights Management
Explanation
DRM, which stands for Digital Rights Management, is a technology used to control how exported content might be viewed, edited, and redistributed. It is commonly used to protect copyrighted material and ensure that the content is only accessed by authorized users. DRM systems typically employ encryption and access controls to prevent unauthorized copying or sharing of digital files. By implementing DRM, content creators and distributors can have greater control over their intellectual property and protect their rights.
7.
SSL- encrypted communications between the desktop client and the server
SSL stands for
Correct Answer(s)
Secure Sockets Layer
Explanation
SSL stands for Secure Sockets Layer, which is a protocol used for encrypting communications between a desktop client and a server. This encryption ensures that the data transmitted between the client and the server remains secure and cannot be intercepted or tampered with by unauthorized individuals. By using SSL, sensitive information such as login credentials, credit card numbers, and personal data can be transmitted safely over the internet, providing a secure connection for online transactions and communication.
8.
Port number for HTTPS
Correct Answer
B. Port 443
Explanation
Port 443 is the correct answer because it is the standard port number for HTTPS (Hypertext Transfer Protocol Secure). HTTPS is a secure version of HTTP that encrypts data transmitted between a web browser and a website, ensuring the privacy and integrity of the information. Port 443 is commonly used for secure communication, such as online banking, e-commerce, and secure file transfers. By using this port, the data is encrypted and protected from unauthorized access or tampering.
9.
Port Number for SQL Database
Correct Answer
C. Port 1433
Explanation
Port 1433 is the correct answer because it is the default port number for Microsoft SQL Server. When connecting to a SQL Server database, the client application typically uses port 1433 to establish a connection with the server. This port allows the client to send and receive data from the SQL Server instance. Other ports mentioned, such as 389, 443, and 8282, are not commonly associated with SQL databases and are used for other protocols or services.
10.
Port Number for vCO
Correct Answer
D. Port 8282
11.
Triple-A elements are the security corner stone of IP based network management and policy administration.
Correct Answer
D. Authentication, Authorization and Accounting
Explanation
Authentication, Authorization, and Accounting (AAA) are the three essential elements of network security and policy administration. Authentication ensures that only authorized users can access the network. Authorization determines the level of access and permissions granted to authenticated users. Accounting tracks and logs the activities of users on the network for auditing and billing purposes. Together, these three elements form the foundation of secure and efficient IP-based network management and policy administration.
12.
Which layer best define the following description?
The modularity of this layered approach dramatically simplifies development, debugging, and maintenance.
Correct Answer
A. Automation
Explanation
The description suggests that the layer being referred to simplifies development, debugging, and maintenance. Automation is the layer that is primarily responsible for automating tasks and processes, which can greatly simplify these activities. Therefore, the layer that best defines the given description is Automation.
13.
Which layer best define the following description?
This layer provides the ability to delegate certain aspects of the administration
Correct Answer
D. Self-Service
Explanation
The layer that best defines the ability to delegate certain aspects of the administration is the Self-Service layer. This layer allows users to access and manage resources without the need for direct involvement from administrators. It enables users to perform tasks such as provisioning, monitoring, and configuring resources on their own, providing them with a level of control and autonomy in managing their own resources.