10.1.10 PQ NSF

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is a disadvantage of server virtualization? -A compromised host system might affect multiple servers. -It increases hardware costs. -A compromised guest system might affect multiple servers. -Systems are isolated from each other and cannot interact with other systems.

A compromised host system might affect multiple servers.

A tech company wants to increase its security measures by isolating its various development, testing, and production environments. The company wants to ensure that these environments are reproducible and managing these dependencies consistently. Which approach would be MOST beneficial in meeting these requirements? -Containerization -Software-defined networking (SDN) -Virtualization -Industrial control systems (ICS)/supervisory control and data acquisition (SCADA)

Containerization

Which of the following are advantages of virtualization? (Select two.) -Redundancy of hardware components for fault tolerance -Reduced utilization of hardware resources -Improved host-based attack detection -Centralized administration -Easy migration of systems to different hardware

Easy migration of systems to different hardware Centralized administration

Which of the following devices is computer software, firmware, or hardware that creates and runs virtual machines? -Virtual router -Virtual switch -Virtual firewall -Hypervisor

Hypervisor

Which of the following is a technique that disperses a workload between two or more computers or resources to achieve optimal resource utilization, throughput, or response time? -Load balancing -Hypervisor -Virtualization -Bottleneck

Load balancing

Evaluating the security risks tied to a company's virtualized environment, a network administrator relies on multiple virtual machines (VMs) for service distribution throughout the infrastructure. The administrator's primary concern is a specific risk: an application compromised within a VM might interact with the host system and potentially propagate harmful activities. What strategy should the network administrator employ to mitigate this risk and guarantee the individual VMs' integrity and isolation in the company's virtualized environment? -Mitigating virtual machine escape -Implementing network segmentation -Enforcing user access controls -Establishing firewall rules

Mitigating virtual machine escape

Which of the following is an advantage of a virtual browser? -Filters internet content based on ratings -Prevents adware and spyware that monitor your internet activity -Prevents phishing and drive-by downloads -Protects the host operating system from malicious downloads

Protects the host operating system from malicious downloads

What is isolating a virtual machine from the physical network to allow testing to be performed without impacting the production environment called? -Sandboxing -Resource pooling -Workload balancing -Testing

Sandboxing

Which type of hypervisor runs as an application on the host machine? -Type 1 -Type 4 -Type 2 -Type 3

Type 2

Which load balancing method distributes a workload across multiple computers? -Resource pooling -Bottleneck -Workload balancing -Virtualization

Workload balancing


Kaugnay na mga set ng pag-aaral

Physics 1310 Exam 2 - gregory spencer

View Set

Chapter 8: lesson 3 laws and rules

View Set

FIN: Ch 10 Making Capital Investment Decisions

View Set