Network+ Chapter 7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which encryption protocol does GRE use to increase the security of its transmissions? SSH SSL IPsec SFTP

ipsec

Which of the following cloud model is like thin-client model of software provisioning? PaaS AaaS IaaS SaaS

SaaS

Which of the following are examples of Platform as a Service (PaaS)? Google Compute Engine (GCE) Cisco Metapod Microsoft Azure Apprenda

apprenda

You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing? host-to-host network-to-network Both network-to-network and network-to-host network-to-host

network-to-network

Which cloud computing services model gives software developers access to multiple operating systems for testing? SaaS IaaS PaaS XaaS

paas

Which remote file access protocol is an extension of SSH? TFTP FTPS SFTP HTTPS

sftp

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes? Virtual firewall Virtual router Virtual load balancer Virtual switch

virtual switch

Which of the following are examples of Software As A Service (SaaS) cloud model?

The correct examples of SaaS are Google Apps, Salesforce, Workday, Concur, Citrix GoToMeeting, and Cisco WebEx.

Which tunneling protocol is a component of the IPsec protocol suite? PPTP IKEv2 OpenVPN L2TP

IKEv2

Which of the following is the correct use case for a public cloud? [Choose all that apply.] Need for auto-scaling environment to host large Web applications Need for high configurability and flexibility Hosting of latency intolerant Web tiers

The correct use cases for a public cloud are: Need for auto-scaling environment to host large Web applications Hosting of latency intolerant Web tiers

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? Symmetric Integrity Confidentiality Availability

integrity

Which of the following is an example of a public cloud? [Choose all that apply.] Amazon Web Services Apprenda IBM Bluemix Microsoft Azure Cisco Metapod

The three known examples of public cloud are Amazon Web Services, Microsoft Azure, and IBM Bluemix.

You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure? Virtual Switch Hypervisor Virtual Router Virtual Firewall

Virtual Switch

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources? Group Policy Active Directory RAS (Remote Access Service) DirectAccess

directaccess

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer? NFV (Network Functions Virtualization) SDN (software-defined networking) Terminal emulation Hypervisor

hypervisor

With which network connection type does the VM obtain IP addressing information from its host? Host-only mode Bridged mode NAT mode Managed mode

nat mode

Refer to the exhibit. You are asked to provide a single user on the Internet with secure access to corporate network resources. Which type of VPN is the best choice to implement to achieve this? Client-to-Client Client-to-Site Site-to-Client Site-to-Site

Client-to-Site

Which remote access protocol is used over an Ethernet network? RAS PPPoE SLIP PPP

PPPoE

A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the networkWhich of the above statements is true? Statement 1 Statements 2 and 3 Statements 1 and 3 Statements 1 and 2 Statement 2

Statements 2 and 3

The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased? Distributed Switching Centralized Switching Modular Switching Consolidated Switching

Ethernet switches utilize distributed switching on separate cards within a single or multiple equipment chasses. It is common to have a centralized switching fabric to interconnect the distributed switching units. This architecture has become less common in recent years as backplane bus speeds and centralized switch fabric capacities have increased.

Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network? Wi-Fi endpoint Proxy server VoIP PBX VPN concentrator UTM appliance

A Virtual Private Network (VPN) is a type of connection that allows the establishment of secure connections between a client and a server or between two geographically disparate networks over an insecure network such as the Internet. A VPN concentrator is a device that usually resides on the enterprise network that accepts incoming VPN connection requests and acts as a central node for multiple VPN connections.

Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources? Privileged user agreement Licensing restrictions document Incident response policy Password policy

A privileged user agreement is a contractual agreement signed by a user of a specific enterprise or organizational network that describes in detail the responsibilities of the user of the network. It includes a detailed description of the policies and laws that the user must abide by to be provided privileged access to the network and its resources.

You have created a virtual machine. For the virtual machine to communicate with the physical network, what should you configure in the virtual machine? NIC Virtual NIC Router Hypervisor

A virtual Network Interface Card (NIC) is an entity that is created in software that allows a Virtual Machine (VM) to access the Ethernet network. It is configured just like its physical counterpart with an IP address, default gateway but exists entirely within software. It is bridged with a physical NIC which places its frames on the wire with the MAC address that is unique to the virtual NIC.


Ensembles d'études connexes

Ch 40 Introduction to Health Care Law and Ethics

View Set

MOAC Excel Lesson 6 Managing Worksheets

View Set

LS1 Week 8 Chapter 46 Management of PT with Gastric and Duodenal Disorders

View Set

Module 2: Principles of Insurance

View Set

Chapter 3: The Constitution Multiple Choice

View Set

🔫🔫🔫🧼Chapter 16 test 🧼🍡🧼

View Set