Module 9 Virtual Lab | ITE-249-02
9.1: 1. What is the minimum number of load balancers needed to configure active/active load balancing? 2 1 3 4
2
2. Which of the following relates to the term Data Sovereignty? An organization's internal security policy The usage of the data by the organization's users Country specific laws and regulations The type of storage used for data
Country specific laws and regulations
4. Which of the following are ways of configuring access control lists (ACL)? [Choose all that apply] Per-group basis Using an effective right mask Per-user basis Making the file read-only
Per-group basis Using an effective right mask Per-user basis
3. Which of the following tasks can be performed using the out-of-band management feature in network devices? [Choose all that apply] Power-on the network device Reinstall the operating system Perform maintenance Reboot the network device Upgrade the firmware
All Power-on the network device Reinstall the operating system Perform maintenance Reboot the network device Upgrade the firmware
2. Which feature of Windows 10 establishes a persistent virtual private network (VPN) connection when there is Internet connectivity? Always On VPN Persistent VPN Full VPN Active VPN
Always On VPN
9.2: 1. Which of the following should be mentioned by a network diagram? [Choose all that apply.] IP addresses and names of the devices Devices present on the network Names of users using the devices Connectivity between the devices Configuration of the devices
IP addresses and names of the devices Devices present on the network Connectivity between the devices
5. Which of the following statements describe the implications of IPv6? [Choose all that apply] IPv6 addresses are long and difficult to remember Networks need to be upgraded or redesigned The adoption of IPv6 is still missing with many organizations Devices and operating systems need to be upgraded
IPv6 addresses are long and difficult to remember Networks need to be upgraded or redesigned The adoption of IPv6 is still missing with many organizations Devices and operating systems need to be upgraded
3. Which of the following term relates to the accuracy and consistency of data? Integrity Availability Confidentiality Discretion
Integrity
5. Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply] Threat prevention Endpoint protection Malware prevention Identity and Access Management (IAM) Data Loss Prevention (DLP) Cloud governance
Threat prevention Malware prevention Identity and Access Management (IAM) Data Loss Prevention (DLP) Cloud governance
4. When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply] Type of connectivity available Fiber backbone availability Locations of the customers Internet service provider's presence Power availability
Type of connectivity available Fiber backbone availability Locations of the customers Internet service provider's presence Power availability