Exam 7: Virtualization and Cloud Computing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

C

What two different types of encryption can be utilized with IPsec?

Free
(Essay)
4.8/5
(36)
Correct Answer:
Verified

Data encrypted for use with an IPsec connection may utilize either AH (authentication header) encryption or ESP (Encapsulating Security Payload) encryption. Both types of encryption provide authentication of the IP packet's data payload through public key techniques. In addition, ESP encrypts the entire IP packet for added security.

Which statement regarding the use of a bridged mode vNIC is accurate?

Free
(Multiple Choice)
4.9/5
(30)
Correct Answer:
Verified

A

When deploying cloud services, what are some of the deployment models you might encounter?

(Essay)
4.8/5
(41)

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

(Multiple Choice)
4.8/5
(32)

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?

(Multiple Choice)
4.7/5
(36)

Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA).

(True/False)
5.0/5
(34)

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

(Multiple Choice)
4.8/5
(41)

What are some of the features that all cloud services usually have in common?

(Essay)
4.7/5
(29)

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.

(True/False)
4.9/5
(37)

The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.

(True/False)
5.0/5
(35)

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?

(Multiple Choice)
4.9/5
(29)

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

(Multiple Choice)
4.8/5
(42)

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

(Multiple Choice)
4.8/5
(34)

Which of the following is NOT a task that a VPN concentrator is responsible for?

(Multiple Choice)
4.9/5
(35)

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

(Multiple Choice)
4.9/5
(30)

A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.

(True/False)
4.8/5
(27)

What is the difference between a virtual firewall and a software firewall?

(Essay)
4.9/5
(42)

Which of the following virtualization products is an example of a bare-metal hypervisor?

(Multiple Choice)
4.9/5
(37)

The use of certificate authorities to associate public keys with certain users is known by what term?

(Multiple Choice)
4.8/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)