Exam 10: Virtual Networks and Remote Access

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The software required to establish VPNs is usually expensive.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

False

In ____, each datagram can follow one of many paths to reach its destination.

Free
(Multiple Choice)
5.0/5
(37)
Correct Answer:
Verified

C

On network diagrams, the Internet is frequently depicted as a ____.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

Describe the L2TP technology.

(Essay)
4.8/5
(37)

Each VM is known as a ____.

(Multiple Choice)
4.9/5
(31)

Most cloud service providers use virtualization software to supply multiple platforms to multiple users.

(True/False)
4.7/5
(39)

A VPN tunneling protocol operates at the ____ layer.

(Multiple Choice)
4.8/5
(37)

VPNs can be classified based on the kinds of ____ they connect.

(Multiple Choice)
4.8/5
(45)

List two things that distinguish cloud computing.

(Essay)
4.8/5
(31)

Describe metered service.

(Essay)
4.9/5
(40)

____ are wide area networks that are logically defined over public transmission systems.

(Multiple Choice)
4.8/5
(37)

In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.

(Multiple Choice)
4.9/5
(39)
Match each term with the correct statement below.
The emulation of a computer, operating system environment, or application on a physical system.
Tunnel
When multiple customers share storage locations or services without knowing it.
Multitenant
The virtual connection between two VPN endpoints.
NaaS
Correct Answer:
Verified
Premises:
Responses:
The emulation of a computer, operating system environment, or application on a physical system.
Tunnel
When multiple customers share storage locations or services without knowing it.
Multitenant
The virtual connection between two VPN endpoints.
NaaS
Software whose code is publicly available for use and modification.
cloud services
A service provider offers its customers a complete set of networking services.
Virtualization
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
open source
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
L2TP
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
XaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
elastic
(Matching)
4.8/5
(36)

The physical computer on a virtual machine is known as a ____.

(Multiple Choice)
4.8/5
(38)

____ connect vNICs with a network, whether virtual or physical.

(Multiple Choice)
4.7/5
(37)

To connect to a network, a virtual machine requires a ____.

(Multiple Choice)
4.8/5
(31)

In a ____ VPN, tunnels connect multiple sites on a WAN.

(Multiple Choice)
4.8/5
(40)

The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.

(Short Answer)
4.7/5
(40)

What are three advantages of virtualization?

(Essay)
4.9/5
(38)

When a server compares a user's credentials with those in its database, the process is known as ____.

(Multiple Choice)
4.7/5
(43)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)