101c07

Ace your homework & exams now with Quizwiz!

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model? A - A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides. B - An organization wishes to gain access to applications through an online user interface, while maintaining compatibility across operating systems. C - An organization needs to have a hosted virtual network infrastructure for their services, which are run on virtual machines. D - A small organization needs to have high availability for their web server.

A - A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM? A - host-only mode B - bridged mode C - NAT mode D - lockdown mode

C - NAT mode

In a software defined network, what is responsible for controlling the flow of data? A - flow director B - vRouter C - SDN controller D - SDN switch

C - SDN controller

The combination of a public key and a private key are known by what term below? A - key set B - key team C - key pair D - key tie

C - key pair

The use of certificate authorities to associate public keys with certain users is known by what term? A - public-key organization B - certified infrastructure C - public-key infrastructure D - symmetric identification

C - public-key infrastructure

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked? A - Layer 2 Tunneling Protocol (L2TP) B - Point-to-Point Tunneling Protocol (PPTP) C - Generic Routing Encapsulation (GRE) D - OpenVPN

D - OpenVPN

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate? A - PPP can negotiate and establish a connection between two endpoints. B - PPP can utilize an authentication protocol, such as MS-CHAPv2 or EAP to authenticate a client. C - PPP can support several Network layer protocols, such as IP, that might use the connection. D - PPP can support strong encryption, such as AH or ESP.

D - PPP can support strong encryption, such as AH or ESP.

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites? A - VPN proxy B - VPN server C - VPN transport D - VPN gateway

D - VPN gateway

A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor. T/F

False

FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol. T/F

False

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models. T/F

True

Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA). T/F

True

PPP can support several types of Network layer protocols that might use the connection. T/F

True

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model? A - Layer 1 B - Layer 2 C - Layer 4 D - Layer 7

B - Layer 2

At what layer of the OSI model does the IPsec encryption protocol operate? A - Physical layer B - Network layer C - Transport layer D - Application layer

B - Network layer

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels? A - Dynamic Multipoint VPN B - Dynamic SmartVPN C - Symmetric VPN Autodial D - Auto Switched VPN Service

A - Dynamic Multipoint VPN

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers? A - IaaS B - PaaS C - SaaS D - XaaS

A - IaaS

Which statement regarding the use of a bridged mode vNIC is accurate? A - The vNIC will its own IP address on the physical LAN. B - The vNIC will be assigned a NAT-ed IP address. C - The vNIC will only be able to communicate across the bridge to the host PC. D - The vNIC will utilize the host PC's IP address.

A - The vNIC will its own IP address on the physical LAN.

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate? A - VNC is faster than Remote Desktop, and requires less network bandwidth. B - VNC is open source, allowing companies to develop their own software based on VNC. C - VNC uses the Remote Desktop Protocol (RDP). D - VNC is a standard developed by Microsoft and used by Windows Remote Desktop.

B - VNC is open source, allowing companies to develop their own software based on VNC.

What statement regarding the SSH (Secure Shell) collection of protocols is accurate? A - SSH provides a graphical view of the remote computer. B - SSH does not protect against DNS spoofing. C - SSH does not protect against IP spoofing. D - SSH supports port forwarding.

D - SSH supports port forwarding.


Related study sets

Unit 3 Participation in Government

View Set

Module #22-Chapter 22- Texas: The Executive Branch

View Set

Infant child and development Exam 2

View Set