Vmware player and linux kvm are both examples of what type of hypervisor?

Question 41

  1. The HTTPS (HTTP Secure) protocol utilizes the same TCP port as
    HTTP, port 80.

    True

    False

1.25 points

Question 42

  1. The PPP headers and trailers used to create a PPP frame that
    encapsulates Network layer packets vary between 8 and 10 bytes in
    size due to what field?

    a. FCS
    b. FEC
    c. encryption
    d. priority

1.25 points

Question 43

  1. The Virtual Network Computing (VNC) application uses the
    cross-platform remote frame buffer (RFB) protocol.

    True

    False

1.25 points

Question 44

  1. The combination of a public key and a private key are known by
    what term below?

    a. key tie
    b. key pair
    c. key set
    d. key team

1.25 points

Question 45

  1. The use of certificate authorities to associate public keys with
    certain users is known by what term?

    a. public-key infrastructure
    b. certified infrastructure
    c. symmetric identification
    d. public-key organization

1.25 points

Question 46

  1. VMware Player and Linux KVM are both examples of what type of
    hypervisor?

    a. Type 2 hypervisor
    b. Type 1 hypervisor
    c. barebones hypervisor
    d. bare-metal hypervisor

1.25 points

Question 47

  1. What IEEE standard specifies how VLAN information appears in
    frames and how switches interpret that information?

    a. 802.1c
    b. 802.1V
    c. 802.1d
    d. 802.1Q

1.25 points

Question 48

  1. What cloud service model involves providing applications through
    an online user interface, providing for compatibility with a
    multitude of different operating systems and devices?

    a. XaaS
    b. SaaS
    c. PaaS
    d. IaaS

1.25 points

Question 49

  1. What command will set the native VLAN on a Juniper switch
    port?

    a. config native vlan
    b. switchport trunk native vlan
    c. switchport set native vlan
    d. set native-vlan-id

1.25 points

Question 50

  1. What does the VLAN Trunk Protocol (VTP) do?

    a. It is the protocol used by a trunk port for establishing a trunk
    with another switch.
    b. It shares VLAN database information amongst switches that
    participate.
    c. It shares trunking information amongst switches that
    participate.
    d. It is the protocol that defines how VLAN tagging is accomplished
    in an Ethernet network.

1.25 points

Question 51

  1. What is NOT a potential disadvantage of utilizing
    virtualization?

    a. Licensing costs can be high due to every instance of commercial
    software requiring a separate license.
    b. Virtualization software increases the complexity of backups,
    making creation of usable backups difficult.
    c. Multiple virtual machines contending for finite resources can
    compromise performance.
    d. Increased complexity and administrative burden can result from
    the use of virtual machines.

1.25 points

Question 52

  1. What is NOT one of the ways in which networks are commonly
    segmented?

    a. by device manufacturer
    b. by device types
    c. by geographic location
    d. by departmental boundaries

1.25 points

Question 53

  1. What is the maximum number of host IP addresses that can exist
    in a Class B network?

    a. 65,534
    b. 32,766
    c. 8190
    d. 1022

1.25 points

Question 54

  1. What open-source VPN protocol utilizes OpenSSL for encryption
    and has the ability to possibly cross firewalls where IPsec might
    be blocked?

    a. OpenVPN
    b. Point-to-Point Tunneling Protocol (PPTP)
    c. Generic Routing Encapsulation (GRE)
    d. Layer 2 Tunneling Protocol (L2TP)

1.25 points

Question 55

  1. What security encryption protocol requires regular
    re-establishment of a connection and can be used with any type of
    TCP/IP transmission?

    a. SSL
    b. TLS
    c. L2TP
    d. IPsec

1.25 points

Question 56

  1. What special enterprise VPN supported by Cisco devices creates
    VPN tunnels between branch locations as needed rather than
    requiring constant, static tunnels?

    a. Dynamic SmartVPN
    b. Dynamic Multipoint VPN
    c. Auto Switched VPN Service
    d. Symmetric VPN Autodial

1.25 points

Question 57

  1. What statement regarding the SSH (Secure Shell) collection of
    protocols is accurate?

    a. SSH provides a graphical view of the remote computer.
    b. SSH does not protect against IP spoofing.
    c. SSH supports port forwarding.
    d. SSH does not protect against DNS spoofing.

1.25 points

Question 58

  1. What subnet mask can be used to segment the 172.16.0.0 network
    to allow for a minimum of 6 subnets while maximizing the number of
    hosts per subnet?

    a. 255.255.192.0
    b. 255.255.224.0
    c. 255.255.248.0
    d. 255.255.128.0

1.25 points

Question 59

  1. What term is used to describe a space that is rented at a data
    center facility by a service provider?

    a. point of presence (PoP)
    b. locally exchanged data point (ledp)
    c. central service point (CSP)
    d. service location (SL)

1.25 points

Question 60

  1. What type of scenario would be best served by using a Platform
    as a Service (PaaS) cloud model?

    a. A group of developers needs access to multiple operating systems
    and the runtime libraries that the OS provides.
    b. An organization needs to have a hosted virtual network
    infrastructure for their services, which are run on virtual
    machines.
    c. A small organization needs to have high availability for their
    web server.
    d. An organization wishes to gain access to applications through an
    online user interface, while maintaining compatibility across
    operating systems.

Answer

Question 41

  1. The HTTPS (HTTP Secure) protocol utilizes the same TCP port as
    HTTP, port 80.

ANSWER:false

42.

The PPP headers and trailers used to create a PPP frame that
encapsulates Network layer packets vary between 8 and 10 bytes in
size due to what field?

Answer:FCS

43.

The Virtual Network Computing (VNC) application uses the
cross-platform remote frame buffer (RFB) protocol.

Answer:true

44.

The combination of a public key and a private key are known by
what term below?

Answer: keypair

45.

The use of certificate authorities to associate public keys with
certain users is known by what term?

Answer: public-key infrastructure

46.

VMware Player and Linux KVM are both examples of what type of
hypervisor?

Answer: Type 2 hypervisor

47.

What IEEE standard specifies how VLAN information appears in
frames and how switches interpret that information?

Answer: 802.1Q

48.

What cloud service model involves providing applications through
an online user interface, providing for compatibility with a
multitude of different operating systems and devices?

Answer:Iaas

49.

What command will set the native VLAN on a Juniper switch
port?

Answer: set native-vlan-id

50.

What does the VLAN Trunk Protocol (VTP) do?

Answer:It shares VLAN database information amongst switches that
participate.

51.

What is NOT a potential disadvantage of utilizing
virtualization?

Answer: Virtualization software increases the complexity of
backups, making creation of usable backups difficult

52.

What is NOT one of the ways in which networks are commonly
segmented?

Answer:by device manufacturer

53.

What is the maximum number of host IP addresses that can exist
in a Class B network?

Answer:65534

54.

What open-source VPN protocol utilizes OpenSSL for encryption
and has the ability to possibly cross firewalls where IPsec might
be blocked?

Answer:OpenVPN

55.What security encryption protocol requires regular
re-establishment of a connection and can be used with any type of
TCP/IP transmission?

Answer:IPsec

56.

What special enterprise VPN supported by Cisco devices creates
VPN tunnels between branch locations as needed rather than
requiring constant, static tunnels?

Answer:Dynamic Multipoint VPN

57.

What statement regarding the SSH (Secure Shell) collection of
protocols is accurate?

Answer:SSH supports port forwarding.

58.What subnet mask can be used to segment the 172.16.0.0
network to allow for a minimum of 6 subnets while maximizing the
number of hosts per subnet?

Answer: 255.255.224.0

59.What term is used to describe a space that is rented at a
data center facility by a service provider?

Answer: point of presence

60.

What type of scenario would be best served by using a Platform
as a Service (PaaS) cloud model?

Answer:A group of developers needs access to multiple operating
systems and the runtime libraries that the OS provides.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts