Chapter 7

Ace your homework & exams now with Quizwiz!

When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?

Certificate Authority

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

Direct Access

Which tunneling protocol is a component of the IPsec protocol suite?

L2TP

With which network connection type does the VM obtain IP addressing information from its host?

NAT mode

Which remote file access protocol is an extension of SSH?

SFTP

Which current protocol is used to create secure transmissions for HTTP browsing sessions?

SSL/TLS

Which Transport layer protocol does PPTP use?

TCP

Which port must be open for RDP traffic to cross a firewall?

3389

Which of the following is an older, Layer 2 protocol developed by Microsoft that encapsulates VPN data frames? A. PPTP B. L2TP C. GRE D. OpenVPN

A. PPTP

Because public key encryption requires the use of two different keys, it is also known as which type of encryption?

Asymmetric

Which of the following cloud deployment models would the Internet be considered as an example? A. Community B. Private C. Public D. Hybrid

C. Public

List two advantages to using virtualization on a network.

Cost and energy savings, fault and threat isolation, efficient use of resources, simple backups, recovery, and replication

True or False: SSH provides little security for establishing a connection and no security for transmitting data.

False

True or False: VMs that must be available at a specific address, such as mail servers or Web servers, should be assigned host-only network connections.

False

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

In which cloud computing service model are hardware services provided virtually, including network infrastructure devices such as virtual servers?

IaaS

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

Integrity

What kind of device can be used to configure and manage physical and virtual networking devices across the network?

SDN controller

Which type of hypervisor is installed on bare metal?

Type 1 hypervisor

Which cloud computing service model gives software developers access to multiple operating systems for testing?

PaaS

Which type of protocol allows the client and server to introduce themselves to each other and establish terms for how they will exchange data?

handshake

In which networking mode, can VMs on one host exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host?

host-only

Which of the following terms best describe a small file containing verified identification information about the user and the user's public key?

digital certificate

How does a vNIC get a MAC address?

vNIC is automatically assigned a MAC address

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

vSwitch (virtual switch)

Which terminal emulation protocol is similar to RDP but is open source?

VNC (Virtual Network Computing)

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?

OpenVPN

Which remote access protocol is used over an Ethernet network?

PPPoE (PPP over Ethernet)

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?

Hypervisor


Related study sets

Chapter 17 Troubleshooting Tools

View Set

15:Infectious and Chronic Diseases [Infectious Diseases]

View Set

PHARM REVIEW UNIT 5 - INTEGUMENTARY SYSTEM MEDICATIONS

View Set

Momentum, Impulse and Momentum Change

View Set

Chapter 33:Personal Property and Bailments

View Set

EDEC 320 Early Childhood Methods Chapter 1

View Set

alternate item formats priority order (ordered response)

View Set

Unit 1 - AP Computer Science Test

View Set