data com part 4 midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

A reliable backup strategy called ____ includes at least three complete copies of data stored on at least two different types of media with at least one copy stored offsite and, for greater protection, at least one copy kept offline from the remainder of the network. 4-fold Protection Rule 3-2-1-1 Rule 4-steps Rule Happy Paranoid Rule

3-2-1-1 Rule

Antivirus is one kind of network utility software belonging to the group of ____ software. Anti-spam Anti-spyware Network monitoring Anti-malware

Anti-malware

____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive. Crash protection Anti-spyware Anti-spam Anti-malware

Anti-spyware

Very popular in the network's area, IOS is an Operating System running on ____ devices. Microsoft NETGEAR Cisco Apple

Cisco

____ is an advantage of virtualization (choose two). Single point of failure Fault and threat isolation Cost and energy savings Licensing costs

Cost and energy savings

When you create an ____ instance, you will have a VM hosted in one of AWS servers. EC2 EBS RDS S3

EC2

____ instance is a VM hosted on one of AWS's servers. EBS EC2 E3 S3

EC2

The ____ license is associated with software that is free to share and change. site GPL server corporate

GPL

In a distant third place in the rank of the CSPs, ____ claims high popularity for PaaS resources, especially for application and website developers, and has been growing faster in recent years than AWS or Azure. VMware Alibaba Cloud Google Cloud Platform IBM Cloud

Google Cloud Platform

____ is the technology that can be used to virtualize firewall and load balancers. NDS VM NFS NOS

NFS

____ is a more cloud-native storage infrastructure than file systems and block storage. Object storage Auto-scaling Microsoft AD Elastic storage

Object storage

____ are then typically stored in a hierarchical file system. Logs Applications Websites Office and media files

Office and media files

____is the RAID technique also called "striping." RAID 1 RAID 0 RAID 3 RAID 5

RAID 0

____ technique is also known as disk mirroring. RAID 1 RAID 0 RAID 5 RAID 3

RAID 1

____ is the prompt for the Privileged EXEC mode of Cisco's IOS. Router> Router# Router(config)# Router(config-if)#

Router#

In an on-prem network environment, ____ stands for the storage devices of the network are placed in a single location available to all network users. DAN NAS SAN DAS

SAN

____ is similar in concept to software-defined networking since it abstracts the control of storage management away from the physical or virtual disks storing the data. SD-branch SDN SDS SD-WAN

SDS

A(n) ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites. network server single-user-single-station corporate site

corporate

A(n) ____ is a security device or system that supports an access control policy between two networks. load balancer anti-spyware anti-malware firewall

firewall

Many network admins, even those most committed to the advantages of virtualization, are uncomfortable using a virtual ____. storage firewall machine load balancer

firewall

It is called ____ the kind of storage where there is a high cost per stored byte and low cost per data access. cold storage hot storage coarse storage fine-grain storage

hot storage

It is possible to use a(n) ____ to run an Android VM in a computer that functions just like a real Android device. firewall webserver cloud service hypervisor

hypervisor

In the directory service AD, the ____ can be objects, like users, groups of users, computers, applications, and network devices. forest tree domain leaves

leaves

A(n) ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations. file network print memory

network

The ____ manages all the other programs (applications) and resources (such as disk drives, memory, and peripheral devices) in a computer. operating system file server print server user system

operating system

With a system-based or ____ license, there is rarely a software counter controlling the current number of users. interactive user server site corporate

server

A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites or another desktop machine at home. site single-user-single-station interactive user single-user-multiple-station

single-user-multiple-station

____ runs directly on the host system's hardware and does not require an underlying OS. Type 1 hypervisor Type 4 hypervisor Type 3 hypervisor Type 2 hypervisor

Type 1 hypervisor

The ____ OS most often works via a text-based interface, although GUIs are available. Microsoft Windows Server macOS Unix Linux

Unix

____ is not a popular CSP. Azure AWS GCP W3C

W3C


Conjuntos de estudio relacionados

HIST 1302 Chapter 16 Inquizitive

View Set

Managing Finance and Capital Exam Two

View Set

CIS 348 / Week 7 / Chapter 7 & Chapter 8 / Exercise / Lab / Quiz / Assessment

View Set