Exam 7: Virtualization and Cloud Computing
Exam 1: Introduction to Networking50 Questions
Exam 2: Network Infrastructure and Documentation50 Questions
Exam 3: Addressing on Networks50 Questions
Exam 4: Network Protocols and Routing50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Virtualization and Cloud Computing50 Questions
Exam 8: Subnets and VLANs50 Questions
Exam 9: Network Risk Management50 Questions
Exam 10: Security in Network Design50 Questions
Exam 11: Network Performance and Recovery50 Questions
Exam 12: Wide Area Networks50 Questions
Select questions type
FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.
(True/False)
4.8/5
(28)
Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.
(Essay)
4.9/5
(38)
Why is the DTLS (Datagram Transport Layer Security) protocol used for streaming applications that need security?
(Essay)
4.7/5
(37)
All types of remote access techniques connecting to a network require at least one of what two different types of remote access server?
(Essay)
5.0/5
(34)
At what layer of the OSI model does the IPsec encryption protocol operate?
(Multiple Choice)
4.9/5
(33)
What is NOT a potential disadvantage of utilizing virtualization?
(Multiple Choice)
4.9/5
(30)
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?
(Multiple Choice)
4.7/5
(37)
VMware Player and Linux KVM are both examples of what type of hypervisor?
(Multiple Choice)
5.0/5
(40)
A community cloud is a service shared between multiple organizations, but not available publicly.
(True/False)
4.8/5
(39)
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
(Multiple Choice)
4.9/5
(40)
Why is the telnet utility a poor choice for remote access to a device?
(Multiple Choice)
4.9/5
(32)
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
(Multiple Choice)
5.0/5
(31)
The combination of a public key and a private key are known by what term below?
(Multiple Choice)
4.9/5
(31)
The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.
(True/False)
4.8/5
(34)
Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
(Multiple Choice)
4.8/5
(30)
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
(True/False)
4.9/5
(32)
What term is used to describe a space that is rented at a data center facility by a service provider?
(Multiple Choice)
4.9/5
(35)
PPP can support several types of Network layer protocols that might use the connection.
(True/False)
5.0/5
(34)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)