Question.36 What is the primary purpose of a distributed denial of service (DDoS) mitigation service in cloud environments? (A) To prevent unauthorized access to cloud resources (B) To monitor and analyze network traffic patterns (C) To detect and block malicious traffic targeting cloud services (D) To optimize cloud resource utilization |
36. Click here to View Answer
Correct Answer: (C) To detect and block malicious traffic targeting cloud services
Question.37 Which cloud service model provides ready-to-use software applications over the internet? (A) Infrastructure as a Service (IaaS) (B) Platform as a Service (PaaS) (C) Software as a Service (SaaS) (D) Function as a Service (FaaS) |
37. Click here to View Answer
Correct Answer: (C) Software as a Service (SaaS)
Question.38 Which of the following would be considered an endpoint? (A) Software task (B) Router (C) Firewall (D) Laptop |
38. Click here to View Answer
Correct Answer: (D) Laptop
Question.39 Which encryption algorithm is commonly used to protect data in transit between cloud services and users’ devices? (A) AES (Advanced Encryption Standard) (B) RSA (Rivest-Shamir-Adleman) (C) DES (Data Encryption Standard) (D) MD5 (Message Digest Algorithm 5) |
39. Click here to View Answer
Correct Answer: (A) AES (Advanced Encryption Standard)
Question.40 What is an IPv4 address? (A) A 128-bit address used to uniquely identify devices on a network. (B) A 32-bit address used to uniquely identify devices on a network. (C) An address used for internal network use only. (D) An address used for documentation purposes only. |
40. Click here to View Answer
Correct Answer: (B) A 32-bit address used to uniquely identify devices on a network.