Question & Answer: Typically cloud computing services will be rented from an external company that hosts and manages them……

True or False

T          F          1. Typically cloud computing services will be rented from an external company that hosts and manages them.

T          F          2. The service-oriented architecture (SOA) is a form of client/server computing.

T          F          3. The client/server architecture is a blend of decentralized and centralized computing.

T          F          4. A cloud broker evaluates the services provided by a cloud provider in terms of security controls, privacy impact, performance, and so on.

T          F          5. NIST defines three service models that can be viewed as nested service alternatives: SaaS, PaaS, and IaaS.

T          F          6.   Typically, an IP address refers to an individual host on a particular network.

T          F          7.   In an internet environment, multicasting is an easier undertaking.

T          F          8.   One way to assure that the packet is received by all members of the group is to broadcast a copy of each packet to each network in the configuration, over the least-cost route for each network.

T          F          9.   Both the broadcast and multiple unicast strategies are inefficient because they generate unnecessary copies of the source packet.

T          F          10.   IGMP takes advantage of the broadcast nature of a LAN to provide an efficient technique for the exchange of information among multiple hosts and routers.

T          F          11. The idea of universal personal telecommunications refers to the capability of using one’s terminal in a wide variety of environments to connect to information services.

T          F          12. Satellite communications is comparable in importance to optical fiber in the evolution of telecommunications and data communications.

T          F          13.   In contrast to earlier generations, 4G systems do not support traditional circuit-switched telephony service.

T          F          14.   In 4G networks, IP telephony is the norm as are IP packet-switched connections for Internet access.

T          F          15.   4G networks, devices, and services are expected to evolve slowly over the next decade.

T          F          16. A macro virus is a larger and more self-contained than an ordinary virus.

T          F          17. An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.

T          F          18. A stealth virus is explicitly designed to hide itself from detection by antivirus software.

T          F          19. A worm is a program that can replicate itself and send copies from computer to computer across network connections.

T          F          20.   Security threats can be classified based on how a given attack provides a threat to a given

Expert Answer

 

Still stressed from student homework?
Get quality assistance from academic writers!