CMIT 321 Quiz 6
According to the text, characteristics of Virtualization in cloud computing technology include (select all that apply):
Question 1 options:
Encapsulation
Partitioning
Wireless Capable
Isolation
Which of the following are advantages of a using a Community Cloud Deployment? (choose all that apply)
Question 2 options:
Clear Legal Entity
Shared Resources
Compliance to Regulations
High Security
A(n) monitors system files to determine whether an intruder has changed them.
Question 3 options:
Firewall
, SysLog
System integrity verifier
IDS
Some of the Virtualization vendors include (select all that apply):
Question 4 options:
Virtual Box
Microsoft
VMware vCloud Suite
VMware vSphere
What is the technique called when an attacker splits the attack traffic in to many packets to evade IDS?
Question 5 options:
Split Packet
Session splicing
DoS attack
Packet splicing
According to the text, characteristics of Virtualization in cloud computing technology include (select all that apply):
Question 1 options:
Encapsulation
Partitioning
Wireless Capable
Isolation
Which of the following are advantages of a using a Community Cloud Deployment? (choose all that apply)
Question 2 options:
Clear Legal Entity
Shared Resources
Compliance to Regulations
High Security
A(n) monitors system files to determine whether an intruder has changed them.
Question 3 options:
Firewall
, SysLog
System integrity verifier
IDS
Some of the Virtualization vendors include (select all that apply):
Question 4 options:
Virtual Box
Microsoft
VMware vCloud Suite
VMware vSphere
What is the technique called when an attacker splits the attack traffic in to many packets to evade IDS?
Question 5 options:
Split Packet
Session splicing
DoS attack
Packet splicing