Advanced Networking Chapter 14
What does a pull request in source control signify? answer A request for increasing storage space on the repository server A request to pull the latest version from the repository A request to merge branch code back into the main branch A request to delete a branch
A request to merge branch code back into the main branch
What can a cloud consumer assign within each Virtual Private Cloud (VPC)? (Select two.) answer An unlimited number of IPv6 CIDR blocks IPv4 CIDR blocks without any subnets A physical server to each subnet within the VPC An IPv6 CIDR block A single IPv4 CIDR block
An IPv6 CIDR block A single IPv4 CIDR block
What is the difference between an Internet gateway and a NAT gateway in terms of directionality? answer An Internet gateway is two-way, while a NAT gateway is one-way. Both gateways are one-way. Both gateways are two-way. An Internet gateway is one-way, while a NAT gateway is two-way.
An Internet gateway is two-way, while a NAT gateway is one-way.
How do CDN servers ensure that the content they deliver is current? answer By requiring manual updates from the content owner By deleting outdated content By only serving static content that doesn't change By replicating content to remain current with each othe
By replicating content to remain current with each othe
What is required to enable communication between two Virtual Private Clouds (VPCs) that are isolated by default? answer Increasing bandwidth allocation Disabling network isolation Merging the VPCs Configuring routing
Configuring routing
What does a NAT gateway allow an instance to do? answer Assign a public IP address to every instance within a subnet. Monitor and log all Internet traffic. Connect out to the Internet without allowing inbound connections. Encrypt all outbound and inbound communications.
Connect out to the Internet without allowing inbound connections.
Which of the following best describes the relationship between scalability and costs in a cloud system? answer Costs are unrelated to scalability. Costs increase linearly or less than linearly as the system scales. Costs decrease exponentially as the system scales. Costs remain constant regardless of how much the system scales.
Costs increase linearly or less than linearly as the system scales.
What protocol can be used alongside VXLAN for automated configuration and management of the overlay network? answer EVPN FTP SSH HTTP
EVPN
How does elasticity differ from scalability in cloud computing? answer Elasticity focuses on real-time adjustments, while scalability is about long-term growth. Scalability is a technology, while elasticity is a business strategy. Elasticity is about adding more resources, while scalability is about removing resources. Scalability involves using multiple cloud providers, whereas elasticity does not.
Elasticity focuses on real-time adjustments, while scalability is about long-term growth.
What is a characteristic of a hosted private cloud? answer Exclusive use by one organization Mixed public/private solution Lower-tier services offered free of charge Shared resources among multiple organizations
Exclusive use by one organization
What is a key advantage of cloud computing, especially in hybrid models? answer Flexibility Higher security Exclusive use Lower cost
Flexibility
Which cloud service model allows businesses to rent IT resources such as servers and storage on an as-needed basis? answer SaaS DaaS IaaS PaaS
IaaS
Why is Infrastructure as Code important for cloud technologies? answer It enables manual configurations to be more reliable. It encourages the use of scripted approaches to provisioning. It reduces the bandwidth required for cloud services. It simplifies the physical maintenance of cloud servers.
It encourages the use of scripted approaches to provisioning.
Which of the following best describes the function of the Northbound API in SDN architecture? answer It connects the SDN controller to the physical network devices. It facilitates communication between the SDN controller and network applications. It encrypts data traffic between different network layers. It is used for peer-to-peer network communication.
It facilitates communication between the SDN controller and network applications.
Listen to exam instructions What is a major advantage of using a VPN-based method for cloud connectivity? answer It eliminates latency completely. It requires no internet connectivity. It offers unlimited bandwidth. It is cost-effective and straightforward to set up.
It is cost-effective and straightforward to set up.
What is a key benefit of the spine and leaf topology regarding network loops? answer It requires spanning tree to prevent loops. It is inherently loop-free. Loops are managed through manual configuration. Loops are considered beneficial for redundancy.
It is inherently loop-free.
What is the role of an Internet gateway in a subnet's Internet communications? answer It assigns private IP addresses. It performs 1:1 network address translation (NAT). It monitors traffic for security threats. It encrypts data packets.
It performs 1:1 network address translation (NAT).
Which of the following is an example of Software as a Service (SaaS)? answer Microsoft Office 365 Amazon Elastic Compute Cloud OpenStack Oracle Database
Microsoft Office 365
Which of the following is a function of a Cloud Access Security Broker (CASB)? answer Increases the speed of cloud services Reduces the cost of cloud storage Directly improves the performance of SD-WAN connections Monitors and audits user and resource activity
Monitors and audits user and resource activity
Which of the following is NOT a typical device acting as a target in a Fibre Channel SAN? answer Tape drives Network switches RAID drive arrays Single drives
Network switches
In a spine and leaf topology, how are spine switches connected? answer Directly to one another Not directly connected Via the Internet Through a central hub
Not directly connected
Which cloud service model is best suited for businesses that want to develop and test applications without worrying about underlying infrastructure? answer PaaS FaaS IaaS SaaS
PaaS
What are the two subsystems of the policy decision point in ZTA? answer Data plane and control plane Policy engine and policy administrator Authentication server and authorization server Threat intelligence and behavioral analytics
Policy engine and policy administrator
Which server is commonly used to maintain source code in software development environments? answer Repository Server Email Server FTP Server Web Server
Repository Server
In ZTA, what does the separation of the control and data planes achieve? answer Increases the complexity of network management. Enhances the scalability of network infrastructure. Segregating policy decision-making from data transfer. Reduces the need for continuous monitoring.
Segregating policy decision-making from data transfer.
Who are the clients of a SAN? answer Servers running databases or applications Internet users accessing cloud services Client PCs and laptops External storage vendors
Servers running databases or applications
What does a public cloud deployment model offer? answer Services over the Internet to multiple tenants Complete privacy and control over infrastructure Higher security and performance at a lower cost Exclusive use by one organization
Services over the Internet to multiple tenants
What property does a security group have regarding its filtering rules? answer Stateless Stateful Stateless with exceptions Stateful with exception
Stateful
Which type of firewall can store connection states and use rules to allow established or related traffic? answer Stateful packet filtering firewall Web application firewall (WAF) Network layer firewall Application layer firewall
Stateful packet filtering firewall
What is meant by cloud elasticity? answer The ability to add more storage to the cloud system as needed The ability for a cloud system to adjust resources in real-time The use of multiple cloud providers to ensure data redundancy The process of moving data from one cloud provider to another
The ability for a cloud system to adjust resources in real-time
What has changed the nature of data center traffic flows? answer The design of modern applications as services The decrease in internet usage The increase in physical document storage The reduction in server costs
The design of modern applications as services
What is a unique feature of Oracle Cloud Infrastructure (OCI) security lists? answer They require manual activation. They apply to an entire subnet. They are stateless. They can only be applied to one instance at a time.
They apply to an entire subnet.
What is a key feature of the routers, gateways, or VPN apps in an SD-WAN? answer They can only operate in a wired environment. They are SD-WAN capable. They require manual configuration for each site. They function without any form of encryption.
They are SD-WAN capable.
What is the benefit of using virtual appliances in a cloud environment? answer They eliminate the need for any network security. They require dedicated hardware. They can emulate the functions of dedicated hardware appliances. They are only compatible with proprietary operating systems.
They can emulate the functions of dedicated hardware appliances.
Why are upgrades considered complex in infrastructure as code environments? answer They require manual intervention. They are time-consuming. They can introduce unforeseen impacts. They are less secure.
They can introduce unforeseen impacts.
How can CASBs be implemented? answer Only through forward proxies Through VPNs only Through forward proxies, reverse proxies, and APIs Only through reverse proxies
Through forward proxies, reverse proxies, and APIs
What is the role of automation playbooks in Infrastructure as Code? answer To document manual configuration steps for engineers To provide a graphical interface for infrastructure management To automate configuration or build tasks using code blocks To increase the need for human intervention in automated processes
To automate configuration or build tasks using code blocks
Why should a SAN not be implemented on the same cabling as a production data network? answer To reduce costs To increase data rates To simplify network management To avoid performance impacts
To avoid performance impacts
What is the role of Virtual Network Function (VNF) in NFV architecture? answer To enhance security protocols To deploy instances of each virtual appliance To manage physical network devices To provide storage solutions
To deploy instances of each virtual appliance
What is the benefit of segmentation in cloud firewall security? answer To simplify network architecture To reduce the need for firewalls To enhance performance and compliance To eliminate the need for security rules
To enhance performance and compliance
What is the role of a direct connect link in cloud connectivity? answer To connect individual cloud services within the same VPC To provide a secure, encrypted connection over the Internet To establish a connection to the cloud provider's data center To enable peer-to-peer file sharing between cloud instances
To establish a connection to the cloud provider's data center
What is the purpose of a transit gateway in cloud connectivity? answer To provide internet access to cloud services To manage interconnections between VPCs and VPN gateways To reduce the cost of cloud services To increase the storage capacity of VPCs
To manage interconnections between VPCs and VPN gateways
What is the role of virtualized security appliances in modern data centers? answer To manage employee workspaces To store physical documents securely To monitor traffic as it passes between servers To replace physical servers
To monitor traffic as it passes between servers
What is a primary use case for containers in cloud computing? answer To run a single application service or workload task To run heavy desktop applications To increase the need for manual configuration To serve as physical network devices
To run a single application service or workload task
What kind of traffic is referred to as north-south in a data center? answer Traffic that represents clients outside the data center Traffic exclusively within the server management team Traffic between servers within the data center Traffic for internal email communication
Traffic that represents clients outside the data center
Which of the following is a characteristic of SDN? answer Application unaware Transport agnostic Increased need for manual reconfiguration Decentralized policy management
Transport agnostic
What is NVMe over Fabrics (NVMe-oF)? answer A storage device interface Using NVMe in a networked environment A type of Ethernet switch A Fibre Channel switch feature
Using NVMe in a networked environment
How does SD-WAN facilitate secure access to the cloud? answer By using public Internet exclusively Through direct physical connections By requiring manual setup for each connection Using automation and orchestration
Using automation and orchestration
How does a SAN provision access to storage devices? answer Through file-level input/output Via direct physical connections Through application-level protocols Using block input/output
Using block input/output
What technology is typically used inside data centers to implement overlay networks? answer BGP OSPF MPLS VXLAN
VXLAN