Exam 7: Virtualization and Cloud Computing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.

(True/False)
4.8/5
(28)

Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.

(Essay)
4.9/5
(38)

Why is the DTLS (Datagram Transport Layer Security) protocol used for streaming applications that need security?

(Essay)
4.7/5
(37)

All types of remote access techniques connecting to a network require at least one of what two different types of remote access server?

(Essay)
5.0/5
(34)

At what layer of the OSI model does the IPsec encryption protocol operate?

(Multiple Choice)
4.9/5
(33)

What is NOT a potential disadvantage of utilizing virtualization?

(Multiple Choice)
4.9/5
(30)

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

(Multiple Choice)
4.7/5
(37)

VMware Player and Linux KVM are both examples of what type of hypervisor?

(Multiple Choice)
5.0/5
(40)

A community cloud is a service shared between multiple organizations, but not available publicly.

(True/False)
4.8/5
(39)

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

(Multiple Choice)
4.9/5
(40)

Why is the telnet utility a poor choice for remote access to a device?

(Multiple Choice)
4.9/5
(32)

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

(Multiple Choice)
5.0/5
(31)

How does public key encryption work?

(Essay)
4.7/5
(41)

The combination of a public key and a private key are known by what term below?

(Multiple Choice)
4.9/5
(31)

The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.

(True/False)
4.8/5
(34)

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?

(Multiple Choice)
4.8/5
(30)

What is the PPP (Point-to-Point Protocol), and how does it work?

(Essay)
4.8/5
(40)

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

(True/False)
4.9/5
(32)

What term is used to describe a space that is rented at a data center facility by a service provider?

(Multiple Choice)
4.9/5
(35)

PPP can support several types of Network layer protocols that might use the connection.

(True/False)
5.0/5
(34)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)