Network Security Chapter 4 Exam Questions With 100% Correct Answers
Network Security Chapter 4 Exam Questions With 100% Correct Answers Application programming interface (API) - answerA set of routines, standards, protocols, and tools for building software applications to access a web-based software application or web tool. Bit - answerThe most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model. Broadcast - answerBroadcast transmission is a one-to-many (one-to-everyone) form of sending internet traffic. Byte - answerThe byte is a unit of digital information that most commonly consists of eight bits. Cloud computing - answerA model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST 800-145 Community cloud - answerA system in which the cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party or some combination of them, and it may exist on or off premises. NIST 800-145 De-encapsulation - answerThe opposite process of encapsulation, in which bundles of data are unpacked or revealed. Denial-of-Service (DoS) - answerThe prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.) Source: NIST SP 800-27 Rev A Domain Name Service (DNS) - answerThis acronym can be applied to three interrelated elements: a service, a physical server and a network protocol. Encapsulation - answerEnforcement of data hiding and code hiding during all phases of software development and operational use. Bundling together data and methods is the process
Written for
- Institution
- Network Security
- Course
- Network Security
Document information
- Uploaded on
- March 4, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
network security chapter 4 exam questions with 100