CIT 370 - Chapter 7
Which of the following are examples of Software As A Service (SaaS) cloud model? [Choose all that apply.]
Concur Google Apps Salesforce
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
DirectAccess
The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased?
Distributed switching
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
With which network connection type does the VM obtain IP addressing information from its host?
NAT mode
Which of the following is the correct use case for a public cloud? [Choose all that apply.]
Need for auto-scaling environment to host large Web applications Host of latency intolerant Web tiers
Which remote access protocol is used over an Ethernet network?
PPPoE
Which cloud computing services model gives software developers access to multiple operating systems for testing?
PaaS
Which remote file access protocol is an extension of SSH?
SFTP
Which of the following cloud model is like thin-client model of software provisioning
SaaS
Refer to the exhibit. Which of the following approach to computer networking is being displayed?
Software Defined Networking (SDN)
Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?
VPN concentrator
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
Virtual Switch
Private virtual network
You can use this type when you want to allow network communication between virtual machines on the same virtualization server. A private virtual network is not bound to a physical network adapter. This type of network is useful if you want to create an isolated network environment
Internal virtual networks
You can use this type when you want to oallow network communication between virtual machines on the same virtualization server and between virtual machines and the management operating system
Refer to the exhibit. You are asked to provide a single user on the Internet with secure access to corporate network resources. Which type of VPN is the best choice to implement to achieve this?
client-to-site
You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing?
network-to-network
A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the networkWhich of the above statements is true?
statements 2 and 3
Which of the following are examples of Platform as a Service (PaaS)?
Apprenda
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
Hypervisor
Which of the following is an example of a public cloud? [Choose all that apply.]
IBM Bluemix Amazon Web Services Microsoft Azure
Which tunneling protocol is a component of the IPsec protocol suite?
IKEv2
External virtual networks
You can use this type when you want to provide virtual machines with access to a physical network so they can communicate with externally located servers and clients
You have created a virtual machine. For the virtual machine to communicate with the physical network, what should you configure in the virtual machine?
Virtual NIC
You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure?
Virtual Switch
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
Integrity
Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources?
Privileged user agreement