Chapter 7 Review
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
DirectAccess
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
Integrity
Why is the telnet utility a poor choice for remote access to a device?
It provides poor authentication and no encryption.
Which remote access protocol is used over an Ethernet network?
PPPoE
Which cloud computing services model gives software developers access to multiple operating systems for testing?
PaaS
What kind of device can be used to configure and manage physical and virtual networking devices across the network?
SDN controller
Which remote file access protocol is an extension of SSH?
SFTP
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models. True or false?
True
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
Virtual switch
Pick two advantages to using virtualization on a network
1. Efficient use of resources 2. Fault and threat isolation
Which port must be open for RDP traffic to cross a firewall?
3389
A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor. True or false?
False
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
Hypervisor
Which tunneling protocol is a component of the IPsec protocol suite?
IKEv2
Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?
OpenVPN
Which type of hypervisor is installed on bare metal?
Type 1
How does a vNIC get a MAC address?
Upon creation, each vNIC is automatically assigned a MAC address
Which terminal emulation protocol is similar to RDP but is open source?
VNC
When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?
Certificate Authority (CA)
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
Citrix Xen
With which network connection type does the VM obtain IP addressing information from its host?
NAT mode
For Windows computers you can download a ____________ which is a Freeware SSH client.
PuTTy
Which current protocol is used to create secure transmissions for HTTP browsing sessions?
TLS
Which Transport layer protocol does PPTP use?
TCP
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec