Flashcards in Ch 7 Review Deck (10)
Which encryption benchmark ensures data is not modified after it’s
transmitted and before it’s received?
With which network connection type does the VM obtain IP addressing
information from its host?
Which cloud computing services model gives software developers access to
multiple operating systems for testing?
Which encryption protocol does GRE use to increase the security of its
Which remote access protocol is used over an Ethernet network?
Which tunneling protocol is a component of the IPsec protocol suite?
What software allows you to define VMs and manage resource allocation and
sharing among them on a host computer?
What virtual, logically defined device operates at the Data Link layer to pass
frames between nodes?
What service in Windows Server 2016 authenticates remote users and
computers to the Windows domain and its corporate network resources?