Filters
Question type

Study Flashcards

What are some of the features that all cloud services usually have in common?

Correct Answer

verifed

verified

Cloud services usually have the followin...

View Answer

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?


A) Layer 2 Tunneling Protocol (L2TP)
B) Point-to-Point Tunneling Protocol (PPTP)
C) Generic Routing Encapsulation (GRE)
D) OpenVPN

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA).

A) True
B) False

Correct Answer

verifed

verified

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?


A) PPP can negotiate and establish a connection between two endpoints.
B) PPP can utilize an authentication protocol, such as MS-CHAPv2 or EAP to authenticate a client.
C) PPP can support several Network layer protocols, such as IP, that might use the connection.
D) PPP can support strong encryption, such as AH or ESP.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?


A) host-only mode
B) bridged mode
C) NAT mode
D) lockdown mode

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

C

Which statement regarding the use of a bridged mode vNIC is accurate?


A) The vNIC will its own IP address on the physical LAN.
B) The vNIC will be assigned a NAT-ed IP address.
C) The vNIC will only be able to communicate across the bridge to the host PC.
D) The vNIC will utilize the host PC's IP address.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A

What is the difference between a virtual firewall and a software firewall?

Correct Answer

verifed

verified

A software firewall is merely an applica...

View Answer

The use of certificate authorities to associate public keys with certain users is known by what term?


A) public-key organization
B) certified infrastructure
C) public-key infrastructure
D) symmetric identification

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?


A) Dynamic Multipoint VPN
B) Dynamic SmartVPN
C) Symmetric VPN Autodial
D) Auto Switched VPN Service

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

What two different types of encryption can be utilized with IPsec?

Correct Answer

verifed

verified

Data encrypted for use with an IPsec connection may utilize either AH (authentication header) encryption or ESP (Encapsulating Security Payload) encryption. Both types of encryption provide authentication of the IP packet's data payload through public key techniques. In addition, ESP encrypts the entire IP packet for added security.

When deploying cloud services, what are some of the deployment models you might encounter?

Correct Answer

verifed

verified

The main deployment models you are likel...

View Answer

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?


A) Layer 1
B) Layer 2
C) Layer 4
D) Layer 7

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following virtualization products is an example of a bare-metal hypervisor?


A) Citrix XenServer
B) VirtualBox
C) VMware Player
D) Linux KVM

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Regarding VNC (Virtual Network Computing or Virtual Network Connection) , what statement is accurate?


A) VNC is faster than Remote Desktop, and requires less network bandwidth.
B) VNC is open source, allowing companies to develop their own software based on VNC.
C) VNC uses the Remote Desktop Protocol (RDP) .
D) VNC is a standard developed by Microsoft and used by Windows Remote Desktop.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?


A) VMware vSphere
B) Oracle VirtualBox
C) Parallels
D) Citrix Xen

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.

A) True
B) False

Correct Answer

verifed

verified

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?


A) L2TP
B) TLS
C) IPsec
D) SSL

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.

A) True
B) False

Correct Answer

verifed

verified

Which of the following is NOT a task that a VPN concentrator is responsible for?


A) A VPN concentrator authenticates VPN clients.
B) A VPN concentrator establishes tunnels for VPN connections.
C) A VPN concentrator shuts down established connections with malicious traffic occurs.
D) A VPN concentrator manages encryption for VPN transmissions.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer