Time limit: 0
Quiz Summary
0 of 15 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 15
1. Question
You are working for a startup and recently the application you are developing experienced a large amount of traffic. As a result, the performance of the application was decreased. You have been instructed to implement a solution to efficiently distributing incoming network traffic across a group of backend servers to increase the performance of the APP.
Which of the following solutions will you implement to meet the requirement?
CorrectIncorrect -
Question 2 of 15
2. Question
Recently the physical network adapter card from your company’s server broke. As a result, your co-workers couldn’t access important resources for hours. You have been instructed to implement a solution to eliminate this from happening again in the event of a network adapter failure.
Which of the following solutions will you implement to meet the requirement?
CorrectIncorrect -
Question 3 of 15
3. Question
Which of the following backup types only back up the data that has changed since the previous backup?
CorrectIncorrect -
Question 4 of 15
4. Question
Cloud backup is a strategy for sending a copy of files or database to a secondary server, which is usually hosted by a third-party service provider for preservation, in case of equipment failure or catastrophe. (True/False)
CorrectIncorrect -
Question 5 of 15
5. Question
You have been instructed to connect a storage device that allows storage and retrieval of data from a central location for authorized network users and varied clients.
Which of the following storage type will you use to meet the requirement?
CorrectIncorrect -
Question 6 of 15
6. Question
Which of the following actions should be taken to increase the security of SCADA networks? (Choose all that apply)
CorrectIncorrect -
Question 7 of 15
7. Question
Which of the following cryptographic technique will you use to validate the authenticity and integrity of a message or digital document?
CorrectIncorrect -
Question 8 of 15
8. Question
Asymmetrical encryption uses a single key that needs to be shared among the people who need to receive the message while symmetric encryption uses a pair of a public key and a private key to encrypt and decrypt messages when communicating. (True/False)
CorrectIncorrect -
Question 9 of 15
9. Question
Which of the following options allows your application to interact with an external service using a simple set of commands rather than having to create complex processes yourself?
CorrectIncorrect -
Question 10 of 15
10. Question
Which of the following technique will you use to hide secret data within a non-secret file or message with the purpose of avoiding data detection?
CorrectIncorrect -
Question 11 of 15
11. Question
You have been tasked to find a way to transform a plain text sensitive file into a non-readable form and send it through the web. Which of the following technique will you use to send the file through the web and only authorized parties can understand the information?
CorrectIncorrect -
Question 12 of 15
12. Question
Which of the following part(s) of the Authentication, Authorization, and Accounting (AAA) is responsible for measuring the resources a user consumes during access to a system?
CorrectIncorrect -
Question 13 of 15
13. Question
Your company migrates its infrastructure to the public cloud because of the advantages the cloud offers. Which of the following options are advantages of using public cloud services? (Choose all that apply.)
CorrectIncorrect -
Question 14 of 15
14. Question
Which of the following products uses the Software as a Service (SaaS) cloud model? (Choose all the apply.)
CorrectIncorrect -
Question 15 of 15
15. Question
Answer the fill-in-the-blank by typing one of the following type of attacks:
Integration
Deployment
Monitoring
Delivery
-
Continuous is a software development method that releases or deploys software automatically into the production environment. In this model, no one manually checks the code and pushes it into your app.
CorrectIncorrect -