data com part 4 midterm
A reliable backup strategy called ____ includes at least three complete copies of data stored on at least two different types of media with at least one copy stored offsite and, for greater protection, at least one copy kept offline from the remainder of the network. 4-fold Protection Rule 3-2-1-1 Rule 4-steps Rule Happy Paranoid Rule
3-2-1-1 Rule
Antivirus is one kind of network utility software belonging to the group of ____ software. Anti-spam Anti-spyware Network monitoring Anti-malware
Anti-malware
____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive. Crash protection Anti-spyware Anti-spam Anti-malware
Anti-spyware
Very popular in the network's area, IOS is an Operating System running on ____ devices. Microsoft NETGEAR Cisco Apple
Cisco
____ is an advantage of virtualization (choose two). Single point of failure Fault and threat isolation Cost and energy savings Licensing costs
Cost and energy savings
When you create an ____ instance, you will have a VM hosted in one of AWS servers. EC2 EBS RDS S3
EC2
____ instance is a VM hosted on one of AWS's servers. EBS EC2 E3 S3
EC2
The ____ license is associated with software that is free to share and change. site GPL server corporate
GPL
In a distant third place in the rank of the CSPs, ____ claims high popularity for PaaS resources, especially for application and website developers, and has been growing faster in recent years than AWS or Azure. VMware Alibaba Cloud Google Cloud Platform IBM Cloud
Google Cloud Platform
____ is the technology that can be used to virtualize firewall and load balancers. NDS VM NFS NOS
NFS
____ is a more cloud-native storage infrastructure than file systems and block storage. Object storage Auto-scaling Microsoft AD Elastic storage
Object storage
____ are then typically stored in a hierarchical file system. Logs Applications Websites Office and media files
Office and media files
____is the RAID technique also called "striping." RAID 1 RAID 0 RAID 3 RAID 5
RAID 0
____ technique is also known as disk mirroring. RAID 1 RAID 0 RAID 5 RAID 3
RAID 1
____ is the prompt for the Privileged EXEC mode of Cisco's IOS. Router> Router# Router(config)# Router(config-if)#
Router#
In an on-prem network environment, ____ stands for the storage devices of the network are placed in a single location available to all network users. DAN NAS SAN DAS
SAN
____ is similar in concept to software-defined networking since it abstracts the control of storage management away from the physical or virtual disks storing the data. SD-branch SDN SDS SD-WAN
SDS
A(n) ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites. network server single-user-single-station corporate site
corporate
A(n) ____ is a security device or system that supports an access control policy between two networks. load balancer anti-spyware anti-malware firewall
firewall
Many network admins, even those most committed to the advantages of virtualization, are uncomfortable using a virtual ____. storage firewall machine load balancer
firewall
It is called ____ the kind of storage where there is a high cost per stored byte and low cost per data access. cold storage hot storage coarse storage fine-grain storage
hot storage
It is possible to use a(n) ____ to run an Android VM in a computer that functions just like a real Android device. firewall webserver cloud service hypervisor
hypervisor
In the directory service AD, the ____ can be objects, like users, groups of users, computers, applications, and network devices. forest tree domain leaves
leaves
A(n) ____ operating system should be capable of supporting the applications and tools necessary to support Internet operations. file network print memory
network
The ____ manages all the other programs (applications) and resources (such as disk drives, memory, and peripheral devices) in a computer. operating system file server print server user system
operating system
With a system-based or ____ license, there is rarely a software counter controlling the current number of users. interactive user server site corporate
server
A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites or another desktop machine at home. site single-user-single-station interactive user single-user-multiple-station
single-user-multiple-station
____ runs directly on the host system's hardware and does not require an underlying OS. Type 1 hypervisor Type 4 hypervisor Type 3 hypervisor Type 2 hypervisor
Type 1 hypervisor
The ____ OS most often works via a text-based interface, although GUIs are available. Microsoft Windows Server macOS Unix Linux
Unix
____ is not a popular CSP. Azure AWS GCP W3C
W3C
