0% found this document useful (0 votes)
47 views5 pages

Network and Cloud

Uploaded by

wuwalunazx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views5 pages

Network and Cloud

Uploaded by

wuwalunazx
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Network and Cloud – 10 Questions

1. How does cloud computing contribute to “agility” as a benefit for businesses?


a. It eliminates the need for virtualization.
b. It reduces data privacy concerns.
c. It enables rapid deployment of applications and services.
d. It provides unlimited network bandwidth.
2. Which of the following is a primary benefit of cloud computing for businesses?
a. Lower upfront capital costs
b. Slower scalability
c. Increased physical infrastructure management
d. Limited service availability
3. What is the name of Google’s cloud computing platform that offers infrastructure as a service
(IaaS), platform as a service(PaaS) and serverless computing?
a. Google drive
b. Google Workspace
c. Google Cloud Platform (GCP)
d. Google App Engine
4. Which cloud provider is known for its comprehensive and diverse set of machine learning and AI
services?
a. Amazon
b. Microsoft
c. Google
d. Adobe
5. In the context of data centers and the cloud. What is a significant difference between “capital
expenditure” (CapEx) and “operating expenditure” (OpEx)?
a. CapEx represents ongoing operational costs, while OpEx includes upfront hardware
investments.
b. CapEx includes hardware purchases, while OpEx involves recurring expenses like cloud
services.
c. CapEx and OpEx are identical in cloud environments.
d. CapEx is related to software , while OpEx pertains to hardware.
6. Which of the following are well-known and commonly used cyber-attacks by hackers to
compromise system?
a. DDoS and Drive-by Downloads
b. Malware & Malvertising
c. Phishing and Password attacks
d. All of the above
7. What is the term for the cloud computing model in which cloud resources are shared among
Multiple users
a. Private Cloud
b. Public Cloud
c. Hybrid Cloud
d. Community Cloud
8. In Computer networks, the encryption techniques are primarily used for improving the
a. Security
b. Performance
c. Reliability
d. Longevity
9. Which cryptographic algorithm is commonly used for encrypting messages?
a. RSA
b. DES
c. MD5
d. SHA-1
10. What type of attack involves an attacker exploiting a legitimate user’s session to gain
unauthorized access?
a. DDoS attack
b. Spoofing Attack
c. Phishing attack
d. Session Hijacking
11. In the Context of cloud providers, what does “Azure” refer to?
a. A cloud storage service be AWS.
b. A cloud platform by Google
c. A cloud platform by Microsoft.
d. A cloud security tool by IBM.
12. In the context of network security, what is a “firewall”?
a. A software tool to recover lost data
b. A protective barrier between a network and external threats
c. A tool for monitoring network bandwidth
d. A device for routing network traffic
13. In which one of the following phases. IT Architecture Development came?
a. Strategy Phase
b. Planning Phase
c. Deployment Phase
d. Development Phase
14. Which of the following factor of the network gets hugely impacted when the number of users
exceeds the network limit?
a. Reliability
b. Performance
c. Security
d. Longevity
15. In wireless security, what does the term “WPS” stand for?
a. Wireless Protection System
b. Wi-Fi privacy Standard
c. WEP Security protocol
d. Wi-Fi Protected Setup.
16. Which major cloud provider is recognized for its strong presence in the e-commerce, retail, and
media industries and offers services like Amazon S3 and EC2?
a. Google Cloud Platform (GCP)
b. Microsoft Azure
c. IBM Cloud
d. Amazon Web Services (AWS)
17. What does IEEE 802.11 refer to in the context of wireless networking?
a. A standard for microwave ovens
b. A standard for audio codecs
c. A standard for wireless networking
d. A standard for satellite communication
18. Which of the following statements best defines “elasticity” as a characteristic of cloud
computing?
a. The ability to scale resources up or down based on demand
b. The practice of securing cloud environments
c. The process of moving data to the cloud.
d. The flexibility in choosing a cloud provider.
19. ___________ Model consists of the particular types of services that you can access on a cloud
computing platform.
a. Service
b. Deployment
c. Application
d. None of the mentioned

20. What type of rootkit intercepts Hardware calls made by a target operating system hosted as a
virtual machine?
a. Hypervisor Rootkit
b. Kernel Rootkit
c. Application Level Rootkit
d. Bootkit
21. Assume that you manage a business website that has faced unexpected downtimes affecting
user satisfaction. To address this, you decide to employ a website monitoring service. What is
the primary goal of implementing a website monitoring service in this scenario? Select the
correct answer form the given choices.
a. Enhance website design and functionality
b. Optimize server load during peak traffic.
c. Ensure regular Maintenance of the website.
d. Proactively detect and address unexpected downtime
22. Assume that a small business has recently migrated its email services to a cloud based platform
to improve reliability and accessibility. However, concerns have arisen regarding the security of
email communications and the risk of phishing attacks targeting employees email accounts. As a
network security consultant, you are tasked with evaluation the email security measures to
protect sensitive business communications in the cloud Which email security mechanism is most
effective for detecting and preventing phishing attacks targeting employees email accounts in a
cloud based email service? Select the correct option from the given choices.
a. SPF (Sender Policy Framework)
b. DMARC (Domain-based Message Authentication Reporting Conformance)
c. DKIM (Domain Keys Identified Mail)
d. TLS (Transport Layer Security)
23. Assume that a company wants to deploy a cloud based database that can scale horizontally to
accommodate growing data volumes and user traffic.which database model will be most
suitable in this case? Select he correct option from the given choices
a. Relational Databases
b. NoSQL Database
c. Data Warehouse
d. In-Memory Database
24. Consider the ABC organization is planning to enhance the security of its cloud –based services
with Active Directory by implementing a Multi Factor Authentication (MFA) system. Which MFA
approach would be the most appropriate and secure? Select the correct answer form the given
choices
a. Time based one-time password (TOTP) Algorithm with Token Authentication
b. Time Based One-Time Password(TOTP) Algorithm with Authentication
c. Hardware token Authentication with SMS Based
d. SMS based Authentication with Biometric verified
25. Assume that Alice wants to securely communicate with Bob over the internet and devides to
obtain a digital certificated from a trusted Certificate Authority. In this scenario which trust
model should Alice choose for the highest security? Select the correct answer form the given
choices.
a. Hierarchical trust model
b. Web of trust model
c. Mesh trust model
d. Centralized trust model
26. Assume that in a corporate Wi-Fi setup, employees need secure access. Which EAP
authentication method simplifies the process by using only server-side certificates? Select the
correct answer form the given choices.
a. EAP-MD-5
b. EAP-TLS
c. EAP-TTLS
d. PEAP
27. In a computer system utilizing machine learning algorithms, what is the main purpose of using a
‘Convolutional Neural network’ (CNN)?
a. For time-series
b. For Clustering and association in unsupervised learning
c. For image and video recognition
d. For text processing and

You might also like