Exam 7: Administering a Secure Network

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is a means of managing and presenting computer resources by function without regard to their physical layout or location.

(Multiple Choice)
4.9/5
(31)

The ____________________ Layer is omitted in the TCP/IP model.

(Short Answer)
4.8/5
(35)

List and describe three benefits offered by IP telephony.

(Essay)
4.7/5
(39)

SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.

(Multiple Choice)
4.8/5
(42)

Routers operate at the ____ Layer.

(Multiple Choice)
4.9/5
(39)

____________________ servers are intermediate hosts through which Web sites are accessed.

(Short Answer)
4.7/5
(34)

List and describe the three service models of cloud computing.

(Essay)
4.9/5
(40)

A ____ forwards packets across computer networks.

(Multiple Choice)
4.8/5
(35)

In the ____ model, the cloud computing vendor provides access to the vendor's software applications running on a cloud infrastructure.

(Multiple Choice)
4.8/5
(34)

TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.

(True/False)
4.8/5
(29)

A ____ is a feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.

(Multiple Choice)
4.9/5
(32)

In the ____ cloud computing model, the customer has the highest level of control.

(Multiple Choice)
4.8/5
(35)

IP telephony and Voice over IP (VoIP) are identical.

(True/False)
4.9/5
(33)

Describe one way to use FTP on a local host computer.

(Essay)
4.9/5
(37)

IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.

(Multiple Choice)
4.8/5
(38)

____ is used to relay query messages.

(Multiple Choice)
4.9/5
(36)

TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.

(True/False)
4.7/5
(37)

Discuss one security advantage to hosts running virtualization.

(Essay)
4.7/5
(41)

With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.

(Short Answer)
4.9/5
(35)

It is possible to segment a network by physical devices grouped into logical units through a(n) ____.

(Multiple Choice)
4.8/5
(36)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)