CIST 1401 Module 4 review
A network with a CIDR notation of /26 would have what subnet mask?
255.255.255.192
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
True
The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.
True
VMware Player and Linux KVM are both examples of what type of hypervisor?
Type 2 Hypervisor
The combination of a public key and a private key are known by what term below?
key pair
A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.
False
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
False
The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.
False
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS
At what layer of the OSI model does the IPsec encryption protocol operate?
Network Layer