Network CH 7
True
Office 365 is an example of an SaaS implementation with a subscription model.
VNC is open source, allowing companies to develop their own software based on VNC
Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?
FCS
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
Public-key infrastructure
The use of certificate authorities to associate public keys with certain users is known by what term?
Distributed switching
The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased?
Virtualization software increases the complexity of backups, making creation of usable backups difficult.
What is NOT a potential disadvantage of utilizing virtualization?
OpenVPN
What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?
Hypervisor
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
Integrity
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
IPsec
Which encryption protocol does GRE use to increase the security of its transmissions?
Trivial FTP (TFTP)
Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
Apprenda
Which of the following are examples of Platform as a Service (PaaS)?
PPPoE
Which remote access protocol is used over an Ethernet network?
Virtual NIC
You have created a virtual machine. For the virtual machine to communicate with the physical network, what should you configure in the virtual machine?
Network layer
At what layer of the OSI model does the IPsec encryption protocol operate?
False
FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.
Citrix Xen
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
True
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
Dynamic Multipoint VPN
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?
Google Apps, Salesforce, Workday,Concur, Citrix GoToMeeting, Cisco Webex
Which of the following are examples of Software As A Service (SaaS) cloud model? [Select three.]
SaaS
Which of the following cloud model is like thin-client model of software provisioning?
VPN concentrator
Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?
A VPN concentrator shuts down established connections when malicious traffic occurs
Which of the following is NOT a task that a VPN concentrator is responsible for?
Privileged user agreement
Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources?
Amazon Web Services, Microsoft Azure, and IBM Bluemix.
Which of the following is an example of a public cloud? [Choose three.]
Need for auto-scaling environment to host large Web applications & Hosting of latency intolerant Web tiers
Which of the following is the correct use case for a public cloud? [Choose two.]
SFTP
Which remote file access protocol is an extension of SSH?
The vNIC will obtain its own IP address on the physical LAN.
Which statement regarding the use of a bridged mode vNIC is accurate?
IPsec
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
DirectAccess
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
SSH supports port forwarding
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?
Virtual switch
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
PaaS (platform as a service )
Which cloud computing services model gives software developers access to multiple operating systems for testing?
IKEv2
Which tunneling protocol is a component of the IPsec protocol suite?
IaaS
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
NAT mode
With which network connection type does the VM obtain IP addressing information from its host?
Network-to-network
You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing?
Virtual switch
You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure?
Client-to-site
Refer to the exhibit. You are asked to provide a single user on the Internet with secure access to corporate network resources. Which type of VPN is the best choice to implement to achieve this?
Statement 2 & 3
A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the networkWhich of the above statements is true?
True
A community cloud is a service shared between multiple organizations, but not available publicly.
False
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.