Question.6 What is the primary purpose of implementing a disaster recovery plan in a cloud environment? (A) To prevent unauthorized access to cloud resources (B) To ensure continuous availability of critical services during a disaster (C) To optimize cloud resource utilization (D) To automate software deployment processes |
6. Click here to View Answer
Correct Answer: (B) To ensure continuous availability of critical services during a disaster
Question.7 Which device is used to connect WAN to LAN? (A) Firewalls (B) Router (C) Hub (D) Switch |
7. Click here to View Answer
Correct Answer: (B) Router
Question.8 Which cloud service model provides developers with a platform to build, deploy, and manage applications without managing underlying infrastructure? (A) Infrastructure as a Service (IaaS) (B) Platform as a Service (PaaS) (C) Software as a Service (SaaS) (D) Function as a Service (FaaS) |
8. Click here to View Answer
Correct Answer: (B) Platform as a Service (PaaS)
Question.9 An attacker intercepts traffic between a user and a server in order to eavesdrop on sensitive information being transmitted. This is an example of what type of attack? (A) On-path Attack (B) Spoofing (C) Phishing (D) Side-channel |
9. Click here to View Answer
Correct Answer: (A) On-path Attack
Question.10 Which network security measure is used to authenticate and authorize users and devices connecting to a network? (A) Virtual Private Network (VPN) (B) Intrusion Detection System (IDS) (C) Network Access Control (NAC) (D) Packet Filtering |
10. Click here to View Answer
Correct Answer: (C) Network Access Control (NAC)