Chapter 7: Virtualization and Cloud Computing

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which tunneling protocol is a component of the IPsec protocol suite?

IKEv2

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

Integrity

With which network connection type does the VM obtain IP addressing information from its host?

NAT Mode

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?

OpenVPN

Which remote access protocol is used over an Ethernet network?

PPPoE

Which Transport layer protocol does PPTP use?

PPTP (point-to-point tunneling protocol)

Which cloud computing services model gives software developers access to multiple operation systems for testing?

PaaS

Which remote file access protocol is an extension of SSH?

SFTP

Which current protocol is used to create secure transmissions for HTTP browsing sessions?

SSL/TLS

What kind of device can be used to configure and manage physical and virtual networking devices across the network?

vNIC (virtual NIC)

What software allows you to define VMs and manage resource allocation and sharing among them on a computer?

Hypervisor

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

Direct Access

List two advantages to using virtualization on a network.

Efficient use of resources, physical, clients or servers devoted to one function typically use only a fraction of their capacity Cost and energy savings, organizations save money by purchasing fewer and less expensive physical machines

How does a vNIC get a MAC address?

Every VM has its own virtual network adapter, or vNIC (virtual NIC), that can connect the VM to other machines, both virtual and physical. Upon creation, each vNIC is automatically assigned a MAC address

When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?

The digital certificate is issued

Which port must be open for the RDP traffic to cross a firewall?

To allow a Remote Desktop Connection over the internet, the router must be configured to forward RDP traffic (port 3389 to the correct computer

Which type of hypervisor is installed on bare metal?

Type 1 hypervisor

Which terminal emulation protocol is similar to RDP but is open source?

VNC (Virtual Network Computing or Virtual Network Connection)

What virtual, logically defined device operates at the Data Link Layer to pass frames between nodes?

Virtual switch


Set pelajaran terkait

Teaspoons to Tablespoons to Ounces

View Set

Financial Management & Policy - Chapter 16

View Set

ITE 221 Quizzes and Review Questions

View Set

Intro to professional nursing theory (Week 1)

View Set

Chp 4: Main Aspects of Corporate Governance

View Set