Ch 7: Virtualization and Cloud Computing Flashcards

1
Q

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

A

SaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

A

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?

A

In an authorization file on the host where the SSH server is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The combination of a public key and a private key are known by what term below?

A

key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

A

IPsec

Internet Protocol Security: A layer 3 protocol that defines encryption, authentication, and key management for TCP/IP transmissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At what layer of the OSI model does the IPsec encryption protocol operate?

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

A

FCS

Frame Check Sequence: The field in a frame responsible for ensuring that data carried by the frame arrives intact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

A

VPN gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

A

Citrix Xen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

A

OpenVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VMware Player and Linux KVM are both examples of what type of hypervisor?

A

Type 2 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which statement regarding the use of a bridged mode vNIC is accurate?

A

The vNIC will use its own IP address on the physical LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When is it appropriate to utilize the NAT network connection type?

A

Whenever the VM does not need to be access at a known address by other network nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?

A

NAT mode

Network address translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which statement regarding the IKEv2 tunneling protocol is accurate?

A

IKEv2 offers fast throughput and good stability when moving between wireless hotspots.

17
Q

The use of certificate authorities to associate public keys with certain users is known by what term?

A

public-key infrastructure

18
Q

What is NOT a potential disadvantage of utilizing virtualization?

A

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

19
Q

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?

A

Layer 2

20
Q

Which of the following virtualization products is an example of a bare-metal hypervisor?

A

Citrix XenServer

21
Q

In a software defined network, what is responsible for controlling the flow of data?

A

SDN controller

22
Q

What term is used to describe a space that is rented at a data center facility by a service provider?

A

point of presence (PoP)

23
Q

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?

A

PPP can support strong encryption, such as AH or ESP.

24
Q

Why is the telnet utility a poor choice for remote access to a device?

A

It provides poor authentication and no encryption.

25
Q

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

A

SSH supports port forwarding.

26
Q

In order to generate a public and private key for use with SSH, what command line utility should you use?

A

ssh-keygen

27
Q

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

VNC: Software that uses the cross-platform protocol RFB (remote frame buffer) to remotely control a workstation or server.

A

VNC is open source, allowing companies to develop their own software based on VNC.

28
Q

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?

A

Trivial FTP (TFTP)

29
Q

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

A

Dynamic Multipoint VPN

30
Q

Which of the following is NOT a task that a VPN concentrator is responsible for?

VPN concentrator: A specialized device that authenticates VPN clients, establishes tunnels for VPN connections, and manages encryption for VPN transmissions.

A

A VPN concentrator shuts down established connections with malicious traffic occurs.