CIST 1401 Module 4 review

Ace your homework & exams now with Quizwiz!

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

True

The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.

True

VMware Player and Linux KVM are both examples of what type of hypervisor?

Type 2 Hypervisor

The combination of a public key and a private key are known by what term below?

key pair

A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.

False

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.

False

The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.

False

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

At what layer of the OSI model does the IPsec encryption protocol operate?

Network Layer


Related study sets

Programming Logic and Design, Chapter 13

View Set

US History Colonial New Amsterdam

View Set

Intro to Sociology - Chapter 11 Review

View Set

EXAM 2 (CH 6) ~ International Employment Law, Labor Standards, and Ethics ~ GLOBAL HRM

View Set

Microbiology, Ch 25, Nester's 9th

View Set