Question: 25. Erics company has switched to a cloud computing solution where they access their word processing program over the Internet. No one at the company
25. Erics company has switched to a cloud computing solution where they access their word processing program over the Internet. No one at the company has a local copy installed on their workstation. What is this an example of?
a.SaaS
b.PaaS
c.IaaS
d.NaaS
26. You suspect that a recent Windows update caused an anomaly affecting two-thirds of your companys workstations. Which of the following is the next step in the troubleshooting methodology?
a.Document your findings and outcomes.
b.Update and roll back a new system to verify.
c.Test the theory on an affected system.
d.Rollback the update on all affected systems.
27. Whenever network packets are destined for hosts beyond the local subnet, which of the following elements is required?
a.A gateway address
b.An LMHOSTS file
c.Internet access
d.Wireless connectivity
28. You are configuring a firewall for your companys accounting office. The network it will protect handles sensitive data, and you want it to only be able to communicate with hosts on one other specific subnet. Which of the following settings will you configure?
a.Outbound explicit deny
b.Inbound and outbound allow all
c.Inbound and outbound explicit allow
d.Inbound explicit deny
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
