Network+ Chapter 7
Which encryption protocol does GRE use to increase the security of its transmissions? SSH SSL IPsec SFTP
ipsec
Which of the following cloud model is like thin-client model of software provisioning? PaaS AaaS IaaS SaaS
SaaS
Which of the following are examples of Platform as a Service (PaaS)? Google Compute Engine (GCE) Cisco Metapod Microsoft Azure Apprenda
apprenda
You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing? host-to-host network-to-network Both network-to-network and network-to-host network-to-host
network-to-network
Which cloud computing services model gives software developers access to multiple operating systems for testing? SaaS IaaS PaaS XaaS
paas
Which remote file access protocol is an extension of SSH? TFTP FTPS SFTP HTTPS
sftp
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes? Virtual firewall Virtual router Virtual load balancer Virtual switch
virtual switch
Which of the following are examples of Software As A Service (SaaS) cloud model?
The correct examples of SaaS are Google Apps, Salesforce, Workday, Concur, Citrix GoToMeeting, and Cisco WebEx.
Which tunneling protocol is a component of the IPsec protocol suite? PPTP IKEv2 OpenVPN L2TP
IKEv2
Which of the following is the correct use case for a public cloud? [Choose all that apply.] Need for auto-scaling environment to host large Web applications Need for high configurability and flexibility Hosting of latency intolerant Web tiers
The correct use cases for a public cloud are: Need for auto-scaling environment to host large Web applications Hosting of latency intolerant Web tiers
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? Symmetric Integrity Confidentiality Availability
integrity
Which of the following is an example of a public cloud? [Choose all that apply.] Amazon Web Services Apprenda IBM Bluemix Microsoft Azure Cisco Metapod
The three known examples of public cloud are Amazon Web Services, Microsoft Azure, and IBM Bluemix.
You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure? Virtual Switch Hypervisor Virtual Router Virtual Firewall
Virtual Switch
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources? Group Policy Active Directory RAS (Remote Access Service) DirectAccess
directaccess
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer? NFV (Network Functions Virtualization) SDN (software-defined networking) Terminal emulation Hypervisor
hypervisor
With which network connection type does the VM obtain IP addressing information from its host? Host-only mode Bridged mode NAT mode Managed mode
nat mode
Refer to the exhibit. You are asked to provide a single user on the Internet with secure access to corporate network resources. Which type of VPN is the best choice to implement to achieve this? Client-to-Client Client-to-Site Site-to-Client Site-to-Site
Client-to-Site
Which remote access protocol is used over an Ethernet network? RAS PPPoE SLIP PPP
PPPoE
A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the networkWhich of the above statements is true? Statement 1 Statements 2 and 3 Statements 1 and 3 Statements 1 and 2 Statement 2
Statements 2 and 3
The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased? Distributed Switching Centralized Switching Modular Switching Consolidated Switching
Ethernet switches utilize distributed switching on separate cards within a single or multiple equipment chasses. It is common to have a centralized switching fabric to interconnect the distributed switching units. This architecture has become less common in recent years as backplane bus speeds and centralized switch fabric capacities have increased.
Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network? Wi-Fi endpoint Proxy server VoIP PBX VPN concentrator UTM appliance
A Virtual Private Network (VPN) is a type of connection that allows the establishment of secure connections between a client and a server or between two geographically disparate networks over an insecure network such as the Internet. A VPN concentrator is a device that usually resides on the enterprise network that accepts incoming VPN connection requests and acts as a central node for multiple VPN connections.
Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources? Privileged user agreement Licensing restrictions document Incident response policy Password policy
A privileged user agreement is a contractual agreement signed by a user of a specific enterprise or organizational network that describes in detail the responsibilities of the user of the network. It includes a detailed description of the policies and laws that the user must abide by to be provided privileged access to the network and its resources.
You have created a virtual machine. For the virtual machine to communicate with the physical network, what should you configure in the virtual machine? NIC Virtual NIC Router Hypervisor
A virtual Network Interface Card (NIC) is an entity that is created in software that allows a Virtual Machine (VM) to access the Ethernet network. It is configured just like its physical counterpart with an IP address, default gateway but exists entirely within software. It is bridged with a physical NIC which places its frames on the wire with the MAC address that is unique to the virtual NIC.