Quiz 5/6 Review
ALL QUESTIONS 1 ANSWER PER LINE! NO CAPITALS, DASHES, COMMAS ETC... IN ANSWERS!
KK
We also establish funding_________, and estimate the ______ ______ of the organization and its business activities.
A request for proposal (RFP) is a_________ that an organization ________ _______ to elicit _____from potential _______.
A typical RFP requests vendors to specifically identify how they would _______, ______, and _________ a specific business component or system, or the provision of a business service.
A request for quotation (RFQ) is a _________ that an organization submits to one or more __________ ___________ eliciting ________ for a _______ or ______.
A ___________ ____________ is the chain of individuals and organizations involved in getting a product or service from the producer to the consumer.
Individuals and organizations involved in moving (selling & delivery of products), are known as ____________.
A __________ _________ __________, for example, which has no intermediaries between the producer and the consumer, is known as a level ______ ______.
ρ� A distribution channel that has a single intermediary (typically, a retailer) is known as a ______ ______ ________.
A ___________ __________is an individual or business that builds computing systems for clients by combining hardware and software products from multiple vendors.
The cloud can be described as a __________ ____________ _____________ ____________ _________ (9 WORDS - 1 LINE)
The only thing the user's computer needs to be able to run is the cloud computing system's __________ _________
A ________ ________ is one based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet.
A _________ ________ is managed by the organization it serves. A third model, the hybrid cloud, is maintained by both internal and external providers.
A _________ _________ is a cloud computing environment in which an organization provides and manages some resources in-house and has others provided externally.
The __________ __________ allows a business to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to third-party vulnerabilities.
What is PII? (NO NOT 3.141592653589793238462643383279502884197169399375105820974944592307816406286208998628034825342117067982148086513282306647093844609550582231725359408128481117450284102701938521105559644622948954930381964428810975665933446128475648233786783165271201909145648566923460348610454326648213393607260249141273724587006606315588174881520920962829254091715364367892590360011330530548820466521384146951941511609433057270365759591953092186117381932611793105118548074462379962749567351885752724891227938183011949129833673362440656643086021394946395224737190702179860943702770539217176293176752384674818467669405132000568127145263560827785771342757789609173637178721468440901224953430146549585371050792279689258923542019956112129021960864034418159813629774771309960518707211349999998372978049951059731732816096318595024459455346908302642522308253344685035261931188171010003137838752886587533208381420617177669147303598253490428755468731159562863882353787593751957781857780532171226806613001927876611195909216420198938095257201065485863278865936153381827968230301952035301852968995773622599413891249721775283479131515574857242454150695950829533116861727855889075098381754637464939319255060400927701671139009848824012858361603563707660104710181942955596198946767837449448255379774726847104047534646208046684259069491293313677028989152104752162056966024058038150193511253382430035587640247496473263914199272604269922796782354781636009341721641219924586315030286182974555706749838505494588586926995690927210797509302955321165)
Is the process of substituting a sensitive data element with non-sensitive equivalent referred to as a _________.
___________ ___________ represents a group of related businesses or industries that share a common Cloud deployment or physical infrastructure.
Dial-on-Demand allows split tunneling.
True
False
A __________ _________ is used for high availability and it is formed by linking multiple servers and shared resources in a loosely coupled configuration
_____ ______________ makes it possible to group physical links of the same media type and speed to be treated as a single link.
In a personal dial-up connection each system or user does not establish a separate connection to the Internet.
True
False
Dial-On-Demand is automatically activated or deactivated as required.
False
True
RAID ______ creates a second striped set to mirror a primary striped set where if drives fail on both sides you lose data.
RAID _____ creates a striped set from a series of mirrored drives where you only lose data if a mirror loses every drive.
When migrating from ethernet to gigabit, what is the correct order in doing so?
Upgrade the backbone, servers, then the switches
Upgrade the servers, backbone, and then the switches?
Upgrade the backbone, switches, then the servers
Upgrade the switches, backbone, then the servers
Payload convergence uses the same communications _________ to carry different data types. Those being _______ ________ and _______
Physical convergence occurs when payloads travel over the same physical network equipment ______ of their service requirements.
Which of the following are important to wiring closet availability?
Cable management
Network security
Passwords
Physical security
{"name":"Quiz 5\/6 Review", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"ALL QUESTIONS 1 ANSWER PER LINE. NO CAPITALS IN ANSWERS, We also establish funding_________, and estimate the ________ of the organization and its business activities., The network users who would fill out the survey or form fall into three groups:","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}