Network CH 7

Ace your homework & exams now with Quizwiz!

True

Office 365 is an example of an SaaS implementation with a subscription model.

VNC is open source, allowing companies to develop their own software based on VNC

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

FCS

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

Public-key infrastructure

The use of certificate authorities to associate public keys with certain users is known by what term?

Distributed switching

The use of which of the following has decreased over the years because backplane bus speeds and centralized switch fabric capacities have increased?

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

What is NOT a potential disadvantage of utilizing virtualization?

OpenVPN

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

Hypervisor

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?

Integrity

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

IPsec

Which encryption protocol does GRE use to increase the security of its transmissions?

Trivial FTP (TFTP)

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?

Apprenda

Which of the following are examples of Platform as a Service (PaaS)?

PPPoE

Which remote access protocol is used over an Ethernet network?

Virtual NIC

You have created a virtual machine. For the virtual machine to communicate with the physical network, what should you configure in the virtual machine?

Network layer

At what layer of the OSI model does the IPsec encryption protocol operate?

False

FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.

Citrix Xen

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

True

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

Dynamic Multipoint VPN

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

Google Apps, Salesforce, Workday,Concur, Citrix GoToMeeting, Cisco Webex

Which of the following are examples of Software As A Service (SaaS) cloud model? [Select three.]

SaaS

Which of the following cloud model is like thin-client model of software provisioning?

VPN concentrator

Which of the following devices can be installed on the edge of your network to allow multiple remote users to connect securely to your internal enterprise network?

A VPN concentrator shuts down established connections when malicious traffic occurs

Which of the following is NOT a task that a VPN concentrator is responsible for?

Privileged user agreement

Which of the following is a document that must be signed by individuals seeking controlled access to restricted network resources?

Amazon Web Services, Microsoft Azure, and IBM Bluemix.

Which of the following is an example of a public cloud? [Choose three.]

Need for auto-scaling environment to host large Web applications & Hosting of latency intolerant Web tiers

Which of the following is the correct use case for a public cloud? [Choose two.]

SFTP

Which remote file access protocol is an extension of SSH?

The vNIC will obtain its own IP address on the physical LAN.

Which statement regarding the use of a bridged mode vNIC is accurate?

IPsec

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

DirectAccess

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

SSH supports port forwarding

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

Virtual switch

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

PaaS (platform as a service )

Which cloud computing services model gives software developers access to multiple operating systems for testing?

IKEv2

Which tunneling protocol is a component of the IPsec protocol suite?

IaaS

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

NAT mode

With which network connection type does the VM obtain IP addressing information from its host?

Network-to-network

You have configured a VPN between your gateway router and another gateway router of the partner organization. You need to ensure that the communication between both the router is encrypted using IPSec. Which type of IPSec configuration are you doing?

Virtual switch

You need to configure multiple virtual machines (VMs) to connect to a network. To be able to achieve this, which of the following should you configure?

Client-to-site

Refer to the exhibit. You are asked to provide a single user on the Internet with secure access to corporate network resources. Which type of VPN is the best choice to implement to achieve this?

Statement 2 & 3

A VPN concentrator will: 1) allow only one VPN connection to be established at any one time 2) allow multiple VPN connections to be established simultaneously 3) provides remote clients with secure connectivity to the internal network resources of the networkWhich of the above statements is true?

True

A community cloud is a service shared between multiple organizations, but not available publicly.

False

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.


Related study sets

newborn assessment part 1. Part 2 is newborn care

View Set

AP Gov Court Case Flashcards Chris Lovre

View Set

Computer Forensics - Chapter 3 Review Questions

View Set

Module 20: Basic Learning Concepts and Classical Conditioning

View Set

Grado 12: comentarios después de los orales

View Set

PSCI 427: Ch. 11: Products Liability

View Set

Module 2 Chapter 28 Care of Patients Requiring Oxygen Therapy or Tracheostomy

View Set