Deck 10: Virtual Networks and Remote Access

Full screen (f)
exit full mode
Question
____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network.

A) Dialed networking
B) Traditional networking
C) Dial-up networking
D) Virtual networking
Use Space or
up arrow
down arrow
to flip the card.
Question
A ____ uses very little hard disk space or processing power from the workstation on which it is installed.

A) thick client
B) fat client
C) thin client
D) virtual client
Question
PPTP and L2TP are the only protocols that can be used to carry VPN traffic.
Question
____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.

A) Host-only
B) NAT
C) Bridged
D) Blocked
Question
Using a virtualization program, you can create dozens of different VMs.
Question
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.

A) guest machine
B) reference machine
C) host machine
D) management machine
Question
____ connect vNICs with a network, whether virtual or physical.

A) Virtual routers
B) Virtual crossovers
C) Virtual duplexers
D) Virtual bridges
Question
To connect to a network, a virtual machine requires a ____.

A) virtual switch
B) virtual adapter
C) physical switch
D) virtual MAC address
Question
The physical computer on a virtual machine is known as a ____.

A) guest
B) client
C) host
D) server
Question
Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
Question
____ is the most widely implemented virtualization software today.

A) Hyper-V
B) Citrix
C) VirtualBox
D) VMware
Question
Each VM is known as a ____.

A) guest
B) host
C) client
D) node
Question
Upon creation, each vNIC is automatically assigned a ____.

A) MAC address
B) switch address
C) block address
D) reference address
Question
____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.

A) Remote Desktop
B) VNC
C) Citrix
D) Xen
Question
The software required to establish VPNs is usually expensive.
Question
A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
Question
When a server compares a user's credentials with those in its database, the process is known as ____.

A) authorization
B) authentication
C) administration
D) accounting
Question
In the case of dial-up networking, the term ____ refers to a modem.

A) serial connection
B) virtual connection
C) physical connection
D) POTS connection
Question
____ is the remote virtual computing software that comes with Windows client and server operating systems.

A) Remote Server
B) Remote Client
C) Remote Windows
D) Remote Desktop
Question
____ are wide area networks that are logically defined over public transmission systems.

A) VPNs
B) Leased lines
C) Private lines
D) Dial-up lines
Question
Describe the purpose of RRAS and how it is used.
Question
On network diagrams, the Internet is frequently depicted as a ____.

A) block
B) cloud
C) line
D) lightening bolt
Question
VPNs can be classified based on the kinds of ____ they connect.

A) hardware
B) software
C) endpoints
D) circuits
Question
Where do virtual switches or bridges and their configuration reside?
Question
In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
Question
List two potential disadvantages to create multiple guests on a single host machine.
Question
The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.
Question
A VPN tunneling protocol operates at the ____ layer.

A) Network
B) Application
C) Session
D) Data Link
Question
What are three advantages of virtualization?
Question
In a ____ VPN, tunnels connect multiple sites on a WAN.

A) site-to-site
B) site-to-client
C) client-to-client
D) link-to-line
Question
Describe how remote virtual computing is used.
Question
Describe PPPoE.
Question
____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.

A) Virtual
B) Physical
C) Material
D) Guest
Question
What are two important considerations when designing a VPN?
Question
In ____, each datagram can follow one of many paths to reach its destination.

A) circuit switching
B) line switching
C) packet switching
D) data switching
Question
____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.
Question
Describe the L2TP technology.
Question
In bridged mode, a(n) ____________________ accesses a physical network using the host machine's NIC.
Question
A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.
Question
Describe metered service.
Question
List two things that distinguish cloud computing.
Question
Match between columns
The emulation of a computer, operating system environment, or application on a physical system.
Virtualization
The emulation of a computer, operating system environment, or application on a physical system.
open source
The emulation of a computer, operating system environment, or application on a physical system.
Tunnel
The emulation of a computer, operating system environment, or application on a physical system.
L2TP
The emulation of a computer, operating system environment, or application on a physical system.
elastic
The emulation of a computer, operating system environment, or application on a physical system.
Multitenant
The emulation of a computer, operating system environment, or application on a physical system.
NaaS
The emulation of a computer, operating system environment, or application on a physical system.
XaaS
The emulation of a computer, operating system environment, or application on a physical system.
cloud services
When multiple customers share storage locations or services without knowing it.
Virtualization
When multiple customers share storage locations or services without knowing it.
open source
When multiple customers share storage locations or services without knowing it.
Tunnel
When multiple customers share storage locations or services without knowing it.
L2TP
When multiple customers share storage locations or services without knowing it.
elastic
When multiple customers share storage locations or services without knowing it.
Multitenant
When multiple customers share storage locations or services without knowing it.
NaaS
When multiple customers share storage locations or services without knowing it.
XaaS
When multiple customers share storage locations or services without knowing it.
cloud services
The virtual connection between two VPN endpoints.
Virtualization
The virtual connection between two VPN endpoints.
open source
The virtual connection between two VPN endpoints.
Tunnel
The virtual connection between two VPN endpoints.
L2TP
The virtual connection between two VPN endpoints.
elastic
The virtual connection between two VPN endpoints.
Multitenant
The virtual connection between two VPN endpoints.
NaaS
The virtual connection between two VPN endpoints.
XaaS
The virtual connection between two VPN endpoints.
cloud services
Software whose code is publicly available for use and modification.
Virtualization
Software whose code is publicly available for use and modification.
open source
Software whose code is publicly available for use and modification.
Tunnel
Software whose code is publicly available for use and modification.
L2TP
Software whose code is publicly available for use and modification.
elastic
Software whose code is publicly available for use and modification.
Multitenant
Software whose code is publicly available for use and modification.
NaaS
Software whose code is publicly available for use and modification.
XaaS
Software whose code is publicly available for use and modification.
cloud services
A service provider offers its customers a complete set of networking services.
Virtualization
A service provider offers its customers a complete set of networking services.
open source
A service provider offers its customers a complete set of networking services.
Tunnel
A service provider offers its customers a complete set of networking services.
L2TP
A service provider offers its customers a complete set of networking services.
elastic
A service provider offers its customers a complete set of networking services.
Multitenant
A service provider offers its customers a complete set of networking services.
NaaS
A service provider offers its customers a complete set of networking services.
XaaS
A service provider offers its customers a complete set of networking services.
cloud services
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Virtualization
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
open source
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Tunnel
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
L2TP
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
elastic
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Multitenant
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
NaaS
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
XaaS
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
cloud services
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Virtualization
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
open source
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Tunnel
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
L2TP
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
elastic
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Multitenant
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
NaaS
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
XaaS
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
cloud services
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Virtualization
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
open source
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Tunnel
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
L2TP
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
elastic
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Multitenant
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
NaaS
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
XaaS
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
cloud services
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Virtualization
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
open source
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Tunnel
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
L2TP
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
elastic
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Multitenant
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
NaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
XaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
cloud services
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Virtual Networks and Remote Access
1
____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network.

A) Dialed networking
B) Traditional networking
C) Dial-up networking
D) Virtual networking
C
2
A ____ uses very little hard disk space or processing power from the workstation on which it is installed.

A) thick client
B) fat client
C) thin client
D) virtual client
C
3
PPTP and L2TP are the only protocols that can be used to carry VPN traffic.
False
4
____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.

A) Host-only
B) NAT
C) Bridged
D) Blocked
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Using a virtualization program, you can create dozens of different VMs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.

A) guest machine
B) reference machine
C) host machine
D) management machine
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ connect vNICs with a network, whether virtual or physical.

A) Virtual routers
B) Virtual crossovers
C) Virtual duplexers
D) Virtual bridges
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
To connect to a network, a virtual machine requires a ____.

A) virtual switch
B) virtual adapter
C) physical switch
D) virtual MAC address
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The physical computer on a virtual machine is known as a ____.

A) guest
B) client
C) host
D) server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ is the most widely implemented virtualization software today.

A) Hyper-V
B) Citrix
C) VirtualBox
D) VMware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Each VM is known as a ____.

A) guest
B) host
C) client
D) node
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Upon creation, each vNIC is automatically assigned a ____.

A) MAC address
B) switch address
C) block address
D) reference address
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.

A) Remote Desktop
B) VNC
C) Citrix
D) Xen
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The software required to establish VPNs is usually expensive.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
When a server compares a user's credentials with those in its database, the process is known as ____.

A) authorization
B) authentication
C) administration
D) accounting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In the case of dial-up networking, the term ____ refers to a modem.

A) serial connection
B) virtual connection
C) physical connection
D) POTS connection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is the remote virtual computing software that comes with Windows client and server operating systems.

A) Remote Server
B) Remote Client
C) Remote Windows
D) Remote Desktop
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ are wide area networks that are logically defined over public transmission systems.

A) VPNs
B) Leased lines
C) Private lines
D) Dial-up lines
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Describe the purpose of RRAS and how it is used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
On network diagrams, the Internet is frequently depicted as a ____.

A) block
B) cloud
C) line
D) lightening bolt
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
VPNs can be classified based on the kinds of ____ they connect.

A) hardware
B) software
C) endpoints
D) circuits
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Where do virtual switches or bridges and their configuration reside?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
List two potential disadvantages to create multiple guests on a single host machine.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A VPN tunneling protocol operates at the ____ layer.

A) Network
B) Application
C) Session
D) Data Link
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are three advantages of virtualization?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
In a ____ VPN, tunnels connect multiple sites on a WAN.

A) site-to-site
B) site-to-client
C) client-to-client
D) link-to-line
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Describe how remote virtual computing is used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Describe PPPoE.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.

A) Virtual
B) Physical
C) Material
D) Guest
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are two important considerations when designing a VPN?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
In ____, each datagram can follow one of many paths to reach its destination.

A) circuit switching
B) line switching
C) packet switching
D) data switching
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe the L2TP technology.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
In bridged mode, a(n) ____________________ accesses a physical network using the host machine's NIC.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe metered service.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List two things that distinguish cloud computing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
The emulation of a computer, operating system environment, or application on a physical system.
Virtualization
The emulation of a computer, operating system environment, or application on a physical system.
open source
The emulation of a computer, operating system environment, or application on a physical system.
Tunnel
The emulation of a computer, operating system environment, or application on a physical system.
L2TP
The emulation of a computer, operating system environment, or application on a physical system.
elastic
The emulation of a computer, operating system environment, or application on a physical system.
Multitenant
The emulation of a computer, operating system environment, or application on a physical system.
NaaS
The emulation of a computer, operating system environment, or application on a physical system.
XaaS
The emulation of a computer, operating system environment, or application on a physical system.
cloud services
When multiple customers share storage locations or services without knowing it.
Virtualization
When multiple customers share storage locations or services without knowing it.
open source
When multiple customers share storage locations or services without knowing it.
Tunnel
When multiple customers share storage locations or services without knowing it.
L2TP
When multiple customers share storage locations or services without knowing it.
elastic
When multiple customers share storage locations or services without knowing it.
Multitenant
When multiple customers share storage locations or services without knowing it.
NaaS
When multiple customers share storage locations or services without knowing it.
XaaS
When multiple customers share storage locations or services without knowing it.
cloud services
The virtual connection between two VPN endpoints.
Virtualization
The virtual connection between two VPN endpoints.
open source
The virtual connection between two VPN endpoints.
Tunnel
The virtual connection between two VPN endpoints.
L2TP
The virtual connection between two VPN endpoints.
elastic
The virtual connection between two VPN endpoints.
Multitenant
The virtual connection between two VPN endpoints.
NaaS
The virtual connection between two VPN endpoints.
XaaS
The virtual connection between two VPN endpoints.
cloud services
Software whose code is publicly available for use and modification.
Virtualization
Software whose code is publicly available for use and modification.
open source
Software whose code is publicly available for use and modification.
Tunnel
Software whose code is publicly available for use and modification.
L2TP
Software whose code is publicly available for use and modification.
elastic
Software whose code is publicly available for use and modification.
Multitenant
Software whose code is publicly available for use and modification.
NaaS
Software whose code is publicly available for use and modification.
XaaS
Software whose code is publicly available for use and modification.
cloud services
A service provider offers its customers a complete set of networking services.
Virtualization
A service provider offers its customers a complete set of networking services.
open source
A service provider offers its customers a complete set of networking services.
Tunnel
A service provider offers its customers a complete set of networking services.
L2TP
A service provider offers its customers a complete set of networking services.
elastic
A service provider offers its customers a complete set of networking services.
Multitenant
A service provider offers its customers a complete set of networking services.
NaaS
A service provider offers its customers a complete set of networking services.
XaaS
A service provider offers its customers a complete set of networking services.
cloud services
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Virtualization
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
open source
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Tunnel
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
L2TP
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
elastic
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Multitenant
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
NaaS
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
XaaS
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
cloud services
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Virtualization
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
open source
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Tunnel
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
L2TP
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
elastic
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Multitenant
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
NaaS
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
XaaS
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
cloud services
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Virtualization
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
open source
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Tunnel
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
L2TP
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
elastic
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Multitenant
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
NaaS
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
XaaS
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
cloud services
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Virtualization
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
open source
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Tunnel
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
L2TP
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
elastic
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Multitenant
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
NaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
XaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
cloud services
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.