Question: True or False T F 1. Typically cloud computing services will be rented from an external company that hosts and manages them. T F 2.

True or False

T F 1. Typically cloud computing services will be rented from an external company that hosts and manages them.

T F 2. The service-oriented architecture (SOA) is a form of client/server computing.

T F 3. The client/server architecture is a blend of decentralized and centralized computing.

T F 4. A cloud broker evaluates the services provided by a cloud provider in terms of security controls, privacy impact, performance, and so on.

T F 5. NIST defines three service models that can be viewed as nested service alternatives: SaaS, PaaS, and IaaS.

T F 6. Typically, an IP address refers to an individual host on a particular network.

T F 7. In an internet environment, multicasting is an easier undertaking.

T F 8. One way to assure that the packet is received by all members of the group is to broadcast a copy of each packet to each network in the configuration, over the least-cost route for each network.

T F 9. Both the broadcast and multiple unicast strategies are inefficient because they generate unnecessary copies of the source packet.

T F 10. IGMP takes advantage of the broadcast nature of a LAN to provide an efficient technique for the exchange of information among multiple hosts and routers.

T F 11. The idea of universal personal telecommunications refers to the capability of using one's terminal in a wide variety of environments to connect to information services.

T F 12. Satellite communications is comparable in importance to optical fiber in the evolution of telecommunications and data communications.

T F 13. In contrast to earlier generations, 4G systems do not support traditional circuit-switched telephony service.

T F 14. In 4G networks, IP telephony is the norm as are IP packet-switched connections for Internet access.

T F 15. 4G networks, devices, and services are expected to evolve slowly over the next decade.

T F 16. A macro virus is a larger and more self-contained than an ordinary virus.

T F 17. An encrypted virus can only be triggered after an external software program is triggered to decrypt the virus.

T F 18. A stealth virus is explicitly designed to hide itself from detection by antivirus software.

T F 19. A worm is a program that can replicate itself and send copies from computer to computer across network connections.

T F 20. Security threats can be classified based on how a given attack provides a threat to a given

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!