A) point of presence (PoP)
B) service location (SL)
C) central service point (CSP)
D) locally exchanged data point (ledp)
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) File Transfer Protocol (FTP)
B) FTP Secure (FTPS)
C) Secure FTP (SFTP)
D) Trivial FTP (TFTP)
Correct Answer
verified
Multiple Choice
A) A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
B) An organization wishes to gain access to applications through an online user interface, while maintaining compatibility across operating systems.
C) An organization needs to have a hosted virtual network infrastructure for their services, which are run on virtual machines.
D) A small organization needs to have high availability for their web server.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Multiple virtual machines contending for finite resources can compromise performance.
B) Increased complexity and administrative burden can result from the use of virtual machines.
C) Licensing costs can be high due to every instance of commercial software requiring a separate license.
D) Virtualization software increases the complexity of backups, making creation of usable backups difficult.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Physical layer
B) Network layer
C) Transport layer
D) Application layer
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) key set
B) key team
C) key pair
D) key tie
Correct Answer
verified
Multiple Choice
A) Type 1 hypervisor
B) Type 2 hypervisor
C) barebones hypervisor
D) bare-metal hypervisor
Correct Answer
verified
Multiple Choice
A) SSH provides a graphical view of the remote computer.
B) SSH does not protect against DNS spoofing.
C) SSH does not protect against IP spoofing.
D) SSH supports port forwarding.
Correct Answer
verified
Multiple Choice
A) VPN proxy
B) VPN server
C) VPN transport
D) VPN gateway
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) It provides no mechanism for authentication.
B) It does not allow for control of a computer remotely.
C) It cannot be used over a public WAN connection.
D) It provides poor authentication and no encryption.
Correct Answer
verified
Showing 21 - 40 of 50
Related Exams