Network Chapter 7
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
vSwitch
Which tunneling protocol is a component of the IPsec protocol suite?
L2TP
Which remote file access protocol is an extension of SSH?
SFTP
Which encryption benchmark ensures data is not modified after its transmitted and before its received?
CIA
What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?
Direct Access
What software allows you to define VMs and manage resource allocation and sharing among them in a host computer?
Hypervisor
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
With which network connection type does the VM obtain IP addressing information from its host?
NAT
Which remote access protocol is used over an Ethernet network?
PPPoE
Which secured tunneling protocol does PPP use?
PPTP
Which cloud computing services model gives software developers access to multiple operating systems for testing?
PaaS
Which type of hypervisor is installed on baremetal?
Type 1
How does a vNIC get a MAC address?
Upon creation, each vNIC is automatically assigned a MAC address