Advanced Networking Chapter 14

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What does a pull request in source control signify? answer A request for increasing storage space on the repository server A request to pull the latest version from the repository A request to merge branch code back into the main branch A request to delete a branch

A request to merge branch code back into the main branch

What can a cloud consumer assign within each Virtual Private Cloud (VPC)? (Select two.) answer An unlimited number of IPv6 CIDR blocks IPv4 CIDR blocks without any subnets A physical server to each subnet within the VPC An IPv6 CIDR block A single IPv4 CIDR block

An IPv6 CIDR block A single IPv4 CIDR block

What is the difference between an Internet gateway and a NAT gateway in terms of directionality? answer An Internet gateway is two-way, while a NAT gateway is one-way. Both gateways are one-way. Both gateways are two-way. An Internet gateway is one-way, while a NAT gateway is two-way.

An Internet gateway is two-way, while a NAT gateway is one-way.

How do CDN servers ensure that the content they deliver is current? answer By requiring manual updates from the content owner By deleting outdated content By only serving static content that doesn't change By replicating content to remain current with each othe

By replicating content to remain current with each othe

What is required to enable communication between two Virtual Private Clouds (VPCs) that are isolated by default? answer Increasing bandwidth allocation Disabling network isolation Merging the VPCs Configuring routing

Configuring routing

What does a NAT gateway allow an instance to do? answer Assign a public IP address to every instance within a subnet. Monitor and log all Internet traffic. Connect out to the Internet without allowing inbound connections. Encrypt all outbound and inbound communications.

Connect out to the Internet without allowing inbound connections.

Which of the following best describes the relationship between scalability and costs in a cloud system? answer Costs are unrelated to scalability. Costs increase linearly or less than linearly as the system scales. Costs decrease exponentially as the system scales. Costs remain constant regardless of how much the system scales.

Costs increase linearly or less than linearly as the system scales.

What protocol can be used alongside VXLAN for automated configuration and management of the overlay network? answer EVPN FTP SSH HTTP

EVPN

How does elasticity differ from scalability in cloud computing? answer Elasticity focuses on real-time adjustments, while scalability is about long-term growth. Scalability is a technology, while elasticity is a business strategy. Elasticity is about adding more resources, while scalability is about removing resources. Scalability involves using multiple cloud providers, whereas elasticity does not.

Elasticity focuses on real-time adjustments, while scalability is about long-term growth.

What is a characteristic of a hosted private cloud? answer Exclusive use by one organization Mixed public/private solution Lower-tier services offered free of charge Shared resources among multiple organizations

Exclusive use by one organization

What is a key advantage of cloud computing, especially in hybrid models? answer Flexibility Higher security Exclusive use Lower cost

Flexibility

Which cloud service model allows businesses to rent IT resources such as servers and storage on an as-needed basis? answer SaaS DaaS IaaS PaaS

IaaS

Why is Infrastructure as Code important for cloud technologies? answer It enables manual configurations to be more reliable. It encourages the use of scripted approaches to provisioning. It reduces the bandwidth required for cloud services. It simplifies the physical maintenance of cloud servers.

It encourages the use of scripted approaches to provisioning.

Which of the following best describes the function of the Northbound API in SDN architecture? answer It connects the SDN controller to the physical network devices. It facilitates communication between the SDN controller and network applications. It encrypts data traffic between different network layers. It is used for peer-to-peer network communication.

It facilitates communication between the SDN controller and network applications.

Listen to exam instructions What is a major advantage of using a VPN-based method for cloud connectivity? answer It eliminates latency completely. It requires no internet connectivity. It offers unlimited bandwidth. It is cost-effective and straightforward to set up.

It is cost-effective and straightforward to set up.

What is a key benefit of the spine and leaf topology regarding network loops? answer It requires spanning tree to prevent loops. It is inherently loop-free. Loops are managed through manual configuration. Loops are considered beneficial for redundancy.

It is inherently loop-free.

What is the role of an Internet gateway in a subnet's Internet communications? answer It assigns private IP addresses. It performs 1:1 network address translation (NAT). It monitors traffic for security threats. It encrypts data packets.

It performs 1:1 network address translation (NAT).

Which of the following is an example of Software as a Service (SaaS)? answer Microsoft Office 365 Amazon Elastic Compute Cloud OpenStack Oracle Database

Microsoft Office 365

Which of the following is a function of a Cloud Access Security Broker (CASB)? answer Increases the speed of cloud services Reduces the cost of cloud storage Directly improves the performance of SD-WAN connections Monitors and audits user and resource activity

Monitors and audits user and resource activity

Which of the following is NOT a typical device acting as a target in a Fibre Channel SAN? answer Tape drives Network switches RAID drive arrays Single drives

Network switches

In a spine and leaf topology, how are spine switches connected? answer Directly to one another Not directly connected Via the Internet Through a central hub

Not directly connected

Which cloud service model is best suited for businesses that want to develop and test applications without worrying about underlying infrastructure? answer PaaS FaaS IaaS SaaS

PaaS

What are the two subsystems of the policy decision point in ZTA? answer Data plane and control plane Policy engine and policy administrator Authentication server and authorization server Threat intelligence and behavioral analytics

Policy engine and policy administrator

Which server is commonly used to maintain source code in software development environments? answer Repository Server Email Server FTP Server Web Server

Repository Server

In ZTA, what does the separation of the control and data planes achieve? answer Increases the complexity of network management. Enhances the scalability of network infrastructure. Segregating policy decision-making from data transfer. Reduces the need for continuous monitoring.

Segregating policy decision-making from data transfer.

Who are the clients of a SAN? answer Servers running databases or applications Internet users accessing cloud services Client PCs and laptops External storage vendors

Servers running databases or applications

What does a public cloud deployment model offer? answer Services over the Internet to multiple tenants Complete privacy and control over infrastructure Higher security and performance at a lower cost Exclusive use by one organization

Services over the Internet to multiple tenants

What property does a security group have regarding its filtering rules? answer Stateless Stateful Stateless with exceptions Stateful with exception

Stateful

Which type of firewall can store connection states and use rules to allow established or related traffic? answer Stateful packet filtering firewall Web application firewall (WAF) Network layer firewall Application layer firewall

Stateful packet filtering firewall

What is meant by cloud elasticity? answer The ability to add more storage to the cloud system as needed The ability for a cloud system to adjust resources in real-time The use of multiple cloud providers to ensure data redundancy The process of moving data from one cloud provider to another

The ability for a cloud system to adjust resources in real-time

What has changed the nature of data center traffic flows? answer The design of modern applications as services The decrease in internet usage The increase in physical document storage The reduction in server costs

The design of modern applications as services

What is a unique feature of Oracle Cloud Infrastructure (OCI) security lists? answer They require manual activation. They apply to an entire subnet. They are stateless. They can only be applied to one instance at a time.

They apply to an entire subnet.

What is a key feature of the routers, gateways, or VPN apps in an SD-WAN? answer They can only operate in a wired environment. They are SD-WAN capable. They require manual configuration for each site. They function without any form of encryption.

They are SD-WAN capable.

What is the benefit of using virtual appliances in a cloud environment? answer They eliminate the need for any network security. They require dedicated hardware. They can emulate the functions of dedicated hardware appliances. They are only compatible with proprietary operating systems.

They can emulate the functions of dedicated hardware appliances.

Why are upgrades considered complex in infrastructure as code environments? answer They require manual intervention. They are time-consuming. They can introduce unforeseen impacts. They are less secure.

They can introduce unforeseen impacts.

How can CASBs be implemented? answer Only through forward proxies Through VPNs only Through forward proxies, reverse proxies, and APIs Only through reverse proxies

Through forward proxies, reverse proxies, and APIs

What is the role of automation playbooks in Infrastructure as Code? answer To document manual configuration steps for engineers To provide a graphical interface for infrastructure management To automate configuration or build tasks using code blocks To increase the need for human intervention in automated processes

To automate configuration or build tasks using code blocks

Why should a SAN not be implemented on the same cabling as a production data network? answer To reduce costs To increase data rates To simplify network management To avoid performance impacts

To avoid performance impacts

What is the role of Virtual Network Function (VNF) in NFV architecture? answer To enhance security protocols To deploy instances of each virtual appliance To manage physical network devices To provide storage solutions

To deploy instances of each virtual appliance

What is the benefit of segmentation in cloud firewall security? answer To simplify network architecture To reduce the need for firewalls To enhance performance and compliance To eliminate the need for security rules

To enhance performance and compliance

What is the role of a direct connect link in cloud connectivity? answer To connect individual cloud services within the same VPC To provide a secure, encrypted connection over the Internet To establish a connection to the cloud provider's data center To enable peer-to-peer file sharing between cloud instances

To establish a connection to the cloud provider's data center

What is the purpose of a transit gateway in cloud connectivity? answer To provide internet access to cloud services To manage interconnections between VPCs and VPN gateways To reduce the cost of cloud services To increase the storage capacity of VPCs

To manage interconnections between VPCs and VPN gateways

What is the role of virtualized security appliances in modern data centers? answer To manage employee workspaces To store physical documents securely To monitor traffic as it passes between servers To replace physical servers

To monitor traffic as it passes between servers

What is a primary use case for containers in cloud computing? answer To run a single application service or workload task To run heavy desktop applications To increase the need for manual configuration To serve as physical network devices

To run a single application service or workload task

What kind of traffic is referred to as north-south in a data center? answer Traffic that represents clients outside the data center Traffic exclusively within the server management team Traffic between servers within the data center Traffic for internal email communication

Traffic that represents clients outside the data center

Which of the following is a characteristic of SDN? answer Application unaware Transport agnostic Increased need for manual reconfiguration Decentralized policy management

Transport agnostic

What is NVMe over Fabrics (NVMe-oF)? answer A storage device interface Using NVMe in a networked environment A type of Ethernet switch A Fibre Channel switch feature

Using NVMe in a networked environment

How does SD-WAN facilitate secure access to the cloud? answer By using public Internet exclusively Through direct physical connections By requiring manual setup for each connection Using automation and orchestration

Using automation and orchestration

How does a SAN provision access to storage devices? answer Through file-level input/output Via direct physical connections Through application-level protocols Using block input/output

Using block input/output

What technology is typically used inside data centers to implement overlay networks? answer BGP OSPF MPLS VXLAN

VXLAN


Set pelajaran terkait

Chapter 22 - Accounting Changes and Error Analysis (True False)

View Set

Exam 4 (Chapter 46) MGMT of Pt's with Oral and Esophageal Disorders

View Set

Chapter 19 - NC State Insurance Law

View Set

Drivers Edge | ALL Post Tests - Made by Scott Wilkie

View Set

Intro to Information Security Final

View Set

Chapter 2: Developmental, Congenital, and Childhood Diseases and Disorders

View Set

unit 7 financial records and Financial Statements

View Set