Exam 7: Cloud Computing and Remote Access
Exam 1: Introduction to Networking50 Questions
Exam 2: How Computers Find Each Other on Networks49 Questions
Exam 3: How Data Is Transported Over Networks50 Questions
Exam 4: Structured Cabling and Networking Elements50 Questions
Exam 5: Network Cabling50 Questions
Exam 6: Wireless Networking50 Questions
Exam 7: Cloud Computing and Remote Access50 Questions
Exam 8: Network Risk Management50 Questions
Exam 9: Unified Communications and Network Performance Management50 Questions
Exam 10: Network Segmentation and Virtualization50 Questions
Exam 11: Wide Area Networks50 Questions
Exam 12: Industrial and Enterprise Networking50 Questions
Select questions type
Matching
Match each correct item with the statement below.
-In the context of IPsec,a type of encryption that provides authentication of the IPpacket's data payload through public key techniques.Inaddition,it also encrypts the entire IP packet for addedsecurity.
(Multiple Choice)
4.9/5
(26)
Which type of cloud service model involves hardware services that are provided virtually,including network infrastructure devices such as virtual servers?
(Multiple Choice)
4.8/5
(24)
What protocol below only provides the framework for authenticating clients and servers,but relies on other encryption and authentication schemes to verify the credentials of clients or servers?
(Multiple Choice)
4.8/5
(34)
What authentication protocol sends authentication information in cleartext without encryption?
(Multiple Choice)
4.9/5
(32)
In Kerberos,a temporary set of credentials that a client uses to prove that its identity has been validated is known as a _____________.
(Short Answer)
4.9/5
(40)
Windows,UNIX,Linux,and Mac OS clients are all capable of connecting to a VPN usingPPTP.
(True/False)
4.9/5
(34)
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
(Multiple Choice)
4.8/5
(39)
The _________________ cloud service model provides virtual environments online that can be tailored to the needs of developers.
(Short Answer)
4.9/5
(42)
Matching
Match each correct item with the statement below.
-In the context of IPsec,a type ofencryption that provides authentication of the IP packet'sdata payload through public key techniques.
(Multiple Choice)
4.8/5
(23)
The combination of a public key and a private key are known by what term below?
(Multiple Choice)
4.9/5
(39)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)