Cloud Infrastructure Chp 4

Ace your homework & exams now with Quizwiz!

Which process allows a router to modify packets so that multiple devices can share a single public IP address? A. NAT B. DNS C. VLAN D. Subnetting

A. NAT allows your router to change your private IP address into a public IP address so that you can access resources that are external to your organization; then the router tracks those IP address changes.

Which of the following causes network performance to deteriorate and delays network response time? A. Network latency B. Caching C. Network bandwidth D. High CPU and memory usage

A. Network latency is a time delay that is encountered while data is being sent from one point to another on the network and impacts network bandwidth and performance.

Users complain that Internet access has been intermittent. You check the configuration of a user system and discover it has an IP address beginning with 169.254. What is the problem? A. The DHCP server cannot be reached. B. The default gateway cannot be reached. C. The DNS server cannot be reached. D. The proxy server cannot be reached.

A. The DHCP server cannot be reached.

Which of the following IP addresses is in a private IP range? A. 12.152.36.9 B. 10.10.10.10 C. 72.64.53.89 D. 173.194.96.3

B. 10.0.0.0-10.255.255.255 is a private class A address range.

What increases as compression reduces the size of transmitted data? A. Routing complexity B. Available bandwidth C. Cloud ingress network traffic costs D. Cloud egress network traffic costs

B. Available bandwidth

Which of the following terms defines the amount of data that can be sent across a network at a given time? A. Network latency B. Bandwidth C. Compression D. Network load balancing

B. Bandwidth is the amount of data that can traverse a network interface over a specific amount of time.

13. In a network environment _______ is responsible for assigning IP addresses to computers and _______ is responsible for resolving those IP addresses to names. A. DNS, DHCP B. DHCP, DNS C. HTTP, DNS D. DHCP, SMTP

B. DHCP is responsible for assigning IP addresses to computers and DNS is responsible for resolving those IP addresses to names.

Lisa is responsible for a web application running in the public cloud. Recent performance metrics indicate that the average user wait time for page loads is four seconds due to the high number of HTTP requests. What should she configure? A. Compression B. Load balancing C. Proxying D. PKI

B. Load balancing

You administer a website that receives thousands of hits per second. You notice the web server hosting the website is operating at close to capacity. What solution would you recommend to improve the performance of the website? A. Caching B. Network load balancing C. Compression D. Network bandwidth

B. Network load balancing is used to increase performance and provide redundancy for websites and applications.

Your organization plans to use iSCSI for shared network storage. Which technique should be used to ensure that iSCSI traffic is kept separate from other IP traffic? A. LUN masking B. VLANs C. Zoning D. Load balancing

B. VLANs

Which of the following technologies allows you to logically segment a LAN into different broadcast domains? A. MAN B. WAN C. VLAN D. SAN

C. A VLAN allows you to configure separate broadcast domains even if the devices are plugged into the same physical switch.

After taking a new job at the state university, you are asked to recommend a network topology that best fits the large college campus. The network needs to span the entire campus. Which network topology would you recommend? A. LAN B. WAN C. MAN D. SAN

C. A metropolitan area network (MAN) can connect multiple LANs and is used to build networks with high data connection speeds for cities or college campuses.

Which network type is not accessible from outside the organization by default? A. Internet B. Extranet C. Intranet D. LAN

C. An intranet is a private network that is configured and controlled by a single organization and is only accessible by users that are internal to that organization.

Which of the following is a disadvantage of network compression? A. Higher storage requirements B. Longer transmission time C. Higher compute requirements D. Shorter transmission time E. Higher latency

C. Higher compute requirements

SFTP uses _________ to secure FTP communication. A. Certificates B. FTPS C. SSH D. SMTP

C. SFTP uses SSH keys to secure FTP communication.

Which of these ports is the well-known port for the Telnet service? A. 25 B. 22 C. 23 D. 443

C. Telnet uses port 23 by default for its communication.

Which of the following is a network of multiple networks relying on network devices and common protocols to transfer data from one destination to another until it reaches its final destination and is accessible from anywhere? A. Intranet B. Extranet C. Internet D. LAN

C. The Internet is not controlled by a single entity and serves billions of users around the world

Which of the following statements describes the difference between an extranet and an intranet network configuration? A. An intranet does not require a firewall. B. An extranet requires less administration than an intranet. C. An intranet is owned and operated by a single organization. D. An extranet allows controlled access from outside the organization.

D. An extranet is an extension of an intranet with the primary difference being that an extranet allows controlled access from outside the organization.

A client web browser connects to an HTTPS web server. Which port does the server use to communicate back to the client? A. 81 B. 444 C. Any port below 1024 D. Any port above 1024

D. Any port above 1024

Which of the following protocols and ports is used to secure communication over the Internet? A. HTTP over port 80 B. SMTP over port 25 C. FTP over port 21 D. HTTPS over port 443

D. HTTPS is an extension of HTTP that provides secure communication over the Internet and uses port 443 by default.

Andrew is a cloud network administrator. Cloud-based virtual machines hosting a custom web application have been deployed to a single cloud virtual network that currently has no Internet access. Each virtual machine must have Internet access, while incoming connections initiated from the Internet must be blocked. Which solution should the administrator deploy? A. Forward proxy host B. Packet filtering firewall C. Web application firewall D. NAT E. Host based firewall

D. NAT

Which of the following is NOT a benefit of using VLANs? A. Performance B. Reduced costs C. Security D. Reduced network complexity

D. Reduced network complexity

This protocol is responsible for transferring e-mail messages from one mail server to another over the Internet. A. DNS B. HTTPS C. FTP D. SMTP

D. SMTP is used to transfer e-mail messages from one e-mail server to another over the Internet.


Related study sets

Human A&P Lab 301 Part B Patella, Tibia, and Fibula

View Set

Mastering Astronomy: Neutron Stars, Black Holes

View Set

Chapter 17: Neurological Emergencies

View Set

Health Economics, Elasticities, Market Structures, Grossman Model, RAND HIE, Adverse Selection, Moral Hazard, Optimal Insurance Contracts, Progressive and Regressive Taxes, Prospective Payment Systems, Medicare, Medicaid

View Set

Chapter 11: Social Protest/Affirmation

View Set

RN Targeted Medical Surgical: Fluid, Electrolyte, and Acid-Base Online Practice 2019

View Set

Chapter 9: Retention and Motivation

View Set

Week 5 Part 1 (Plant Form and Function)

View Set