CNT3004 CH7

Ace your homework & exams now with Quizwiz!

When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?

CA (Certificate Authority)

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

DirectAccess RAS (Remote Access Service)

List two advantages to using virtualization on a network.

Efficient use of resources Cost and energy savings Fault and threat isolation Simple backups, recovery, and replication

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

Integrity

With which network connection type does the VM obtain IP addressing information from its host?

NAT mode

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?

OpenVPN

Which remote access protocol is used over an Ethernet network?

PPPoE

Which cloud computing services model gives software developers access to multiple operating systems for testing?

PaaS

What kind of device can be used to configure and manage physical and visual networking devices across the network?

SDN controller or network controller

Which remote file access protocol is an extension of SSH?

SFTP

Which Transport layer protocol does PPTP use?

TCP

Which current protocol is used to create secure transmissions for HTTP browsing sessions?

TLS

How does a vNIC get a MAC address?

Upon creation, each vNIC is automatically assigned a MAC address.

Which terminal emulation protocol is similar to RDP but is open source?

VNC (Virtual Networking Communication)

What software allows you to define VMS and manage resource allocation and sharing among them a host computer?

hypervisor

Which type of behavior is installed on bare metal?

type 1

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

virtual switch

Which port must be open for RDP traffic to cross a firewall?

3389

Which tunneling protocol is a component of the IPsec protocol suite?

IKEv2

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec


Related study sets

personality psych ch.11 the humanistic approach

View Set

Key Documents & Speeches in U.S. History

View Set

Ch.5 Cost Approach - Cost Estimating

View Set

MKT421T Wk 5 - Apply: Course Post Assessment

View Set

Unit 6: Overcoming Communication Boundaries

View Set

5.75 Oxidative phosphorylation and the chemiosmotic theory

View Set