CIT 370 - Chapter 7

Ace your homework & exams now with Quizwiz!

Which of the following are examples of Software As A Service (SaaS) cloud model? [Choose all that apply.]

Concur Google Apps Salesforce

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

DirectAccess

The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased?

Distributed switching

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

With which network connection type does the VM obtain IP addressing information from its host?

NAT mode

Which of the following is the correct use case for a public cloud? [Choose all that apply.]

Need for auto-scaling environment to host large Web applications Host of latency intolerant Web tiers

Which remote access protocol is used over an Ethernet network?

PPPoE

Which cloud computing services model gives software developers access to multiple operating systems for testing?

PaaS

Which remote file access protocol is an extension of SSH?

SFTP

Which of the following cloud model is like thin-client model of software provisioning

SaaS

Refer to the exhibit. Which of the following approach to computer networking is being displayed?

Software Defined Networking (SDN)

Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?

VPN concentrator

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

Virtual Switch

Private virtual network

You can use this type when you want to allow network communication between virtual machines on the same virtualization server. A private virtual network is not bound to a physical network adapter. This type of network is useful if you want to create an isolated network environment

Internal virtual networks

You can use this type when you want to oallow network communication between virtual machines on the same virtualization server and between virtual machines and the management operating system

Refer to the exhibit. You are asked to provide a single user on the Internet with secure access to corporate network resources. Which type of VPN is the best choice to implement to achieve this?

client-to-site

You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing?

network-to-network

A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the networkWhich of the above statements is true?

statements 2 and 3

Which of the following are examples of Platform as a Service (PaaS)?

Apprenda

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?

Hypervisor

Which of the following is an example of a public cloud? [Choose all that apply.]

IBM Bluemix Amazon Web Services Microsoft Azure

Which tunneling protocol is a component of the IPsec protocol suite?

IKEv2

External virtual networks

You can use this type when you want to provide virtual machines with access to a physical network so they can communicate with externally located servers and clients

You have created a virtual machine. For the virtual machine to communicate with the physical network, what should you configure in the virtual machine?

Virtual NIC

You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure?

Virtual Switch

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

Integrity

Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources?

Privileged user agreement


Related study sets

Chapter 4: State of Consciousness

View Set

Microbiology Ch 9 biotechnology and Recombinant DNA

View Set

Nursing Health Assessment - ATI Health Assess 2.0 Questions

View Set

H&C Ch 54 Mgmt of Pt W/ Kidney Disorders

View Set

Chapter 23-The Respiratory System (PART ONE)

View Set

respiratory Evolve questions 488 week 4

View Set

Processes that articulate with adjacent bones

View Set