Mod 05: Cloud Connectivity and Troubleshooting

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Quinn is currently looking to deploy a new Microsoft SharePoint server farm, a web-based application, into its own VPC. Which of the following ports would be unnecessary for her to leave open on the firewall for usage or management purposes?

22

LeRoy has decided that the servers in one of the VPCs that he manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should he disable on the firewall for that VPC?

53

Jenna's cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company's website?

AAAA

Davis has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated, and he needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique he is looking to implement?

Cloud bursting

Tim has three separate VPCs at the cloud service provider that his company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might he implement in order to accommodate that requirement?

Cloud peering

A year ago, Raj configured two servers on separate VLANs. He still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for him to do?

Create a route between the two VLANs, so they know how to contact each other.

Darnell does not want to manually assign IP addresses to clients on one of the network segments that he manages. Instead, he wants clients to obtain an IP address from a server that manages a pool of IP addresses. Which of the following technologies should he implement?

DHCP

Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?

DNS servers

Patti's company has just migrated the only Windows server in a particular VPC to a different VPC. Which of the following should she do next?

Disable port 3389 on the firewall of the original VPC.

Kenji has decided upon a multi-cloud deployment so that the company can continue to operate even if one of the cloud service providers experiences an outage. Which of the following explains the factor that was important to Kenji in choosing this structure?

Disaster recovery

Xena has noticed that traffic to her company's website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this?

GSLB

Reggie is troubleshooting an issue related to an incorrectly configured load balancer. He thinks he made a mistake when he was setting up the ports but isn't quite sure if that's the root cause of the issues. Interference or errors in which of the following areas will confirm Reggie's suspicions?

Health-check protocol

Laurel is selecting a VPN protocol for her company's network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?

IKEv2

Jens was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following was Jens reading about?

IPsec

Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?

L2TP

Cara works for a startup company that up until now has been running on a single virtual machine. The virtual machine is starting to see capacity issues and she is unable to provision more CPU and memory resources to satisfy its needs. Which of the following would allow her to expand the capacity of her company's web server?

Load balancer

Emily has just migrated the email from the company's on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn't being delivered to the new servers. Which of the following records does she still need to modify?

MX

Marissa is wanting to implement a VPN at her company but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?

OpenVPN

Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?

OpenVPN

Jordan's manager knows that he is working on implementing a VPN connection between the company's on-premises data center and the cloud service provider his company uses. The manager was concerned that Jordan used an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following protocols was manager was concerned about?

PPTP

Colm is designating the QoS level to the messages on his corporation's network and has determined a certain type of message should be delivered exactly once when it is sent. Which QoS level should he designate these messages?

QoS 2

Uma has been analyzing the performance and baselines from her virtual machines that are on a cloud service provider's platform. She sees that they do not appear to be performing up to the standards that her cloud service provider guarantees. Which of the following documents outlines the standards that they are guaranteeing?

SLA

Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer?

Sticky sessions

Frederica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?

VLAN

Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?

VPN

Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?

VXLAN

Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information?

arp

Justin wants to look at the current IP configuration on a Linux server. Which of the following tools can he use to view this information? (Choose two)

ifconfig ip

Geoff is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. He wants to see what the current dynamic IP address is. Which of the following command line utilities can he use to view that information?

ipconfig

Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use?

netstat

Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be?

nslookup

Jaysen is trying to determine whether one of the new servers he set up on the cloud service provider is reachable and online from his current workstation. Which of the following tools is he most likely trying to use?

ping

Adrienne wants to be able to analyze the traffic coming into a Linux server's network interface. Which of the following command line utilities will allow her to see this information?

tcpdump

Vahé is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can he use to find that information?

traceroute

Denis is trying to determine which route's packets are traveling over when accessing his company's chosen cloud service provider. Which of the following Windows tools can help him discover that information?

tracert


Ensembles d'études connexes

English Trimester 2 Final Exam!!!

View Set

4.36 Mechanoreceptors and Chemoreceptors

View Set