101c07
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model? A - A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides. B - An organization wishes to gain access to applications through an online user interface, while maintaining compatibility across operating systems. C - An organization needs to have a hosted virtual network infrastructure for their services, which are run on virtual machines. D - A small organization needs to have high availability for their web server.
A - A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM? A - host-only mode B - bridged mode C - NAT mode D - lockdown mode
C - NAT mode
In a software defined network, what is responsible for controlling the flow of data? A - flow director B - vRouter C - SDN controller D - SDN switch
C - SDN controller
The combination of a public key and a private key are known by what term below? A - key set B - key team C - key pair D - key tie
C - key pair
The use of certificate authorities to associate public keys with certain users is known by what term? A - public-key organization B - certified infrastructure C - public-key infrastructure D - symmetric identification
C - public-key infrastructure
What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked? A - Layer 2 Tunneling Protocol (L2TP) B - Point-to-Point Tunneling Protocol (PPTP) C - Generic Routing Encapsulation (GRE) D - OpenVPN
D - OpenVPN
Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate? A - PPP can negotiate and establish a connection between two endpoints. B - PPP can utilize an authentication protocol, such as MS-CHAPv2 or EAP to authenticate a client. C - PPP can support several Network layer protocols, such as IP, that might use the connection. D - PPP can support strong encryption, such as AH or ESP.
D - PPP can support strong encryption, such as AH or ESP.
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites? A - VPN proxy B - VPN server C - VPN transport D - VPN gateway
D - VPN gateway
A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor. T/F
False
FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol. T/F
False
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models. T/F
True
Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA). T/F
True
PPP can support several types of Network layer protocols that might use the connection. T/F
True
A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model? A - Layer 1 B - Layer 2 C - Layer 4 D - Layer 7
B - Layer 2
At what layer of the OSI model does the IPsec encryption protocol operate? A - Physical layer B - Network layer C - Transport layer D - Application layer
B - Network layer
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels? A - Dynamic Multipoint VPN B - Dynamic SmartVPN C - Symmetric VPN Autodial D - Auto Switched VPN Service
A - Dynamic Multipoint VPN
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers? A - IaaS B - PaaS C - SaaS D - XaaS
A - IaaS
Which statement regarding the use of a bridged mode vNIC is accurate? A - The vNIC will its own IP address on the physical LAN. B - The vNIC will be assigned a NAT-ed IP address. C - The vNIC will only be able to communicate across the bridge to the host PC. D - The vNIC will utilize the host PC's IP address.
A - The vNIC will its own IP address on the physical LAN.
Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate? A - VNC is faster than Remote Desktop, and requires less network bandwidth. B - VNC is open source, allowing companies to develop their own software based on VNC. C - VNC uses the Remote Desktop Protocol (RDP). D - VNC is a standard developed by Microsoft and used by Windows Remote Desktop.
B - VNC is open source, allowing companies to develop their own software based on VNC.
What statement regarding the SSH (Secure Shell) collection of protocols is accurate? A - SSH provides a graphical view of the remote computer. B - SSH does not protect against DNS spoofing. C - SSH does not protect against IP spoofing. D - SSH supports port forwarding.
D - SSH supports port forwarding.