Network CH 7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

PPPoE

Which remote access protocol is used over an Ethernet network?

Public-key infrastructure

The use of certificate authorities to associate public keys with certain users is known by what term?

Distributed switching

The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased?

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

What is NOT a potential disadvantage of utilizing virtualization?

OpenVPN

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

IPsec

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

DirectAccess

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

Hypervisor

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?

Dynamic Multipoint VPN

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

SSH supports port forwarding

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

Virtual switch

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

PaaS (platform as a service )

Which cloud computing services model gives software developers access to multiple operating systems for testing?

Integrity

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

IPsec

Which encryption protocol does GRE use to increase the security of its transmissions?

Trivial FTP (TFTP)

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?

Apprenda

Which of the following are examples of Platform as a Service (PaaS)?

Google Apps, Salesforce, Workday,Concur, Citrix GoToMeeting, Cisco Webex

Which of the following are examples of Software As A Service (SaaS) cloud model? [Select three.]

SaaS

Which of the following cloud model is like thin-client model of software provisioning?

VPN concentrator

Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?

A VPN concentrator shuts down established connections when malicious traffic occurs

Which of the following is NOT a task that a VPN concentrator is responsible for?

Privileged user agreement

Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources?

Amazon Web Services, Microsoft Azure, and IBM Bluemix.

Which of the following is an example of a public cloud? [Choose three.]

Need for auto-scaling environment to host large Web applications & Hosting of latency intolerant Web tiers

Which of the following is the correct use case for a public cloud? [Choose two.]

SFTP

Which remote file access protocol is an extension of SSH?

The vNIC will obtain its own IP address on the physical LAN.

Which statement regarding the use of a bridged mode vNIC is accurate?

IKEv2

Which tunneling protocol is a component of the IPsec protocol suite?

IaaS

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

NAT mode

With which network connection type does the VM obtain IP addressing information from its host?

Network-to-network

You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing?

Virtual NIC

You have created a virtual machine. For the virtual machine to communicate with the physical network, what should you configure in the virtual machine?

Virtual switch

You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure?

False

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.

Citrix Xen

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

True

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

Network layer

At what layer of the OSI model does the IPsec encryption protocol operate?

True

Office 365 is an example of an SaaS implementation with a subscription model.

Client-to-site

Refer to the exhibit. You are asked to provide a single user on the Internet with secure access to corporate network resources. Which type of VPN is the best choice to implement to achieve this?

VNC is open source, allowing companies to develop their own software based on VNC

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

FCS

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

Statement 2 & 3

A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the networkWhich of the above statements is true?

True

A community cloud is a service shared between multiple organizations, but not available publicly.

False

FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.


Set pelajaran terkait

Twisting and Turning: turn, wheel, twist

View Set

Unit 32 - Three Phase Alternators

View Set

Chapter 49: Assessment and Management of Patients With Hepatic Disorders

View Set

MGMT Test 3 (over 100 except last one and 400) (under 50 from MGT 3370 Exam 3 to MGT Exam 2(CH12))

View Set

*YAY* 24Qw/exp Chapter 13: Infusion Therapy med/surg

View Set

Funds Exam 5 Ch 7, 31, 33, 34 ; Cardio and Respiratory Assessment

View Set

Practice "sometimes, always, never"

View Set

7.5 ~ Linux Application Management

View Set