Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 8 Terms

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
Access Logs   show
🗑
audit log   show
🗑
cloud computing   show
🗑
show Remote file storage.  
🗑
show a cloud open only to specific organizations that have common concerns.  
🗑
show Turning off unused ports for security.  
🗑
show Documents unsuccessful events and most successful ones.  
🗑
show A high speed storage network that can transmit up to 16Gb/s  
🗑
show Encapsulates Fibre Channel packets for ethernet transport.  
🗑
FTP   show
🗑
flood guard   show
🗑
FTP Secure   show
🗑
show The ability to make new virtual server machines available.  
🗑
host elasticity   show
🗑
show A type of virtualization in which an entire operating system environment is simulated.  
🗑
show A combination of public and private clouds.  
🗑
IEEE 802.1x   show
🗑
Infrastructure as a Service   show
🗑
ICMP (Internet Control Message Protocol)   show
🗑
IPv6   show
🗑
show using a data based IP network to add digital voice clients and applications to an IP network.  
🗑
iSCSI   show
🗑
log   show
🗑
loop protection   show
🗑
show Limits the number of MAC addresses allowed on a single port.  
🗑
NETBIOS   show
🗑
Patch compatibility   show
🗑
Platform as a Service (PaaS)   show
🗑
show A cloud that is created and maintained on a private network.  
🗑
show A cloud in which the services and infrastructure are offered to all users with access provided remotely over the internet.  
🗑
rule-based management   show
🗑
sandboxing   show
🗑
Secure Copy Protocol (SCP)   show
🗑
show Secure TCP/IP protocol for transporting data and commands via compression and encryption  
🗑
show Testing the existing security configuration.  
🗑
Security Log   show
🗑
show A TCP/IP protocol that exchanges management information between networked devices. Allows net admins to remotely monitor, manage, and configure devices on the network.  
🗑
show An instance of a particular state of a virtual machine that can be saved for later use.  
🗑
Software as a Service   show
🗑
storage area network   show
🗑
show An older TCP/IP protocol and an application used for text based communications.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: O'Bryan