Network Services, Cloud Computing, and Virtualization

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You have been asked to install Linux in a VM on a Windows 8 client. The Windows 8 client needs 4GB RAM and Linux needs 2GB RAM. How much RAM does the system need at a minimum?

6GB There needs to be enough RAM to support both OSs, so the answer is 6GB. More is better though.

A computer using which of the following would be considered a legacy device? (Choose all that apply.)

A 386 processor The IPX/SPX protocol An application developed in 1983 Legacy systems are ones that use older hardware, software, or network protocols that are not commonly used today. A system with only 1GB RAM might be underpowered, but that in and of itself does not make it a legacy system.

Which record type on a DNS server represents an IPv6 host?

AAAA Explanation: The quad A record is used to represent IPv6 hosts. IPv4 hosts need an A record. The CNAME record is used if one host has alias (multiple) names. MX is for a mail server.

Which of the following are services that a print server should provide?

Accepting print jobs from clients Providing clients with the appropriate printer driver during installation Explanation: Print servers should make printers available to clients and accept print jobs. They also process print jobs and manage print priorities. Finally, they provide client computers with the right print drivers when the clients attempt to install the printer.

You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud. Which type of cloud solution might be best for them?

Community When multiple organizations with similar objectives want to combine efforts in a cloud, the best choice is generally a community cloud. This allows for the flexibility and scalability normally found in a public cloud, but it also limits the number of users to a smaller, trusted group.

You have been asked to configure a client-side virtualization solution with three guest OSs. Each one needs Internet access. How should you configure the solution in the most cost effective way?

Each virtual machine will use its own virtual NIC. The virtual NICs will communicate with a virtual switch managed by the hypervisor. The virtual switch will communicate with the physical NIC.

Your company wants to move to a cloud provider to be able to scale resources quickly, but it is concerned about the security of confidential information. Which of the following types of cloud models might be the most appropriate for your company?

Hybrid A hybrid cloud provides the best of public and private clouds. This gives the great features of a public cloud while simultaneously allowing for the storage of more sensitive information on the private cloud.

You have been asked by your manager to brief the group on security appliances. What is the difference between IDS and IPS?

IDS is passive, and IPS is active. IDS devices are passive. They will detect, log, and perhaps send an alert, but that's it. An IPS can take active steps to shut down an attack if it detects one. Both devices will monitor internal network traffic as well as incoming traffic.

You are installing a file server for the accounting department. Where should this file server be located on the network?

In the secure network Explanation: If the data on the server does not need to be accessed via the Internet, then the server should be in the most secure place possible, which is inside the firewall(s) in the secure network.

Your manager wants to use the cloud because everyone seems to be talking about it. What should you include when you are listing the benefits of using the cloud? (Choose all that apply.)

Increased scalability, Lower cost, Improved reliability

Which cloud service provides network-based services through the cloud, including monitoring and QoS management?

NaaS Network as a service (NaaS) provides network-based services through the cloud, including monitoring and Quality of Service (QoS) management. Answer A is incorrect. Communications as a service (CaaS) is an outsourced enterprise communications solution that can be leased from a single vendor. Answer B is incorrect. Desktop as a service (DaaS) is a form of virtual desktop infrastructure (VDI) in which the VDI is outsourced and handled by a third party.

You are setting up a cloud contract with a provider. Your team needs the ability to increase capacity without intervention from the provider. What do you request?

On-demand self-service The ability to expand services without provider intervention is called on-demand self-service.

What type of server is responsible for preventing users from accessing websites with objectionable content?

Proxy Explanation: A proxy server can be configured to block access to websites that contain potentially dangerous or inflammatory material.

You are configuring two email servers on your company's network. Which network protocol do the servers use to transfer mail to each other?

SMTP Explanation: The Simple Mail Transfer Protocol (SMTP) is used to transfer email between servers.

What does a DHCP server need to be configured with to operate properly?

Scope Every DHCP server needs to have a scope, which is the range of addresses available to clients, as well as other options that it can give to client computers.

Your company hosts its own web server, and it allows consumers to make purchases via the server. The help line has been getting complaints that users are unable to access the secure portion of the website. You open the site and it seems fine, although the secure portion where transactions are completed is inaccessible. What is the most likely cause?

The firewall is blocking TCP port 443. For secure transactions, the web server should be using HTTPS, which uses port 443. If non-secure portions of the website work, then the server is fine. It's most likely that the firewall is blocking inbound traffic on port 443.

You have been asked to set up client-side virtualization on a computer at work. The manager asks for a Type 2 hypervisor. What is the disadvantage of using that type of hypervisor?

The guest OS will compete for resources with the host OS. A Type 2 hypervisor sits on top of an existing OS, meaning that OSs installed in VMs will compete for resources with the host OS. The amount of resources available to a guest OS can be configured. Virtual OSs can get on the physical network if configured properly.

You have been asked to set up client-side virtualization on an office computer. The host OS is Windows 7, and there will be three Windows 7 guest OSs. Which of the following is true about the need for antivirus security?

The host OS and each guest OS need their own antivirus software installed. Each instance of the OS you are running requires its own security software.

Your manager wants you to install a networked Internet appliance that prevents network traffic-based attacks and includes anti-malware and anti-spam software. What should you install?

UTM It sounds like the manager wants a unified threat management (UTM) device. They are designed to be one-stop network protection devices.

When configuring a DNS server, which of the following must be created by the administrator?

Zone file Explanation: DNS server records are contained in the zone file, which must be configured by administrators. A hosts file is an alternative to using DNS (but does not work well when scaling to the Internet). A scope is created on DHCP servers.


Ensembles d'études connexes

[Science] Chapter 10: Ecosystems

View Set

Chapter 5: Job-Based Structures and Job Evaluations

View Set

COM 3110 - Andrea O'Reilly - Chapter 1 Review

View Set

Community Health Nursing Exam (145 Questions)

View Set