Filters
Question type

Study Flashcards

What term is used to describe a space that is rented at a data center facility by a service provider?


A) point of presence (PoP)
B) service location (SL)
C) central service point (CSP)
D) locally exchanged data point (ledp)

Correct Answer

verifed

verified

PPP can support several types of Network layer protocols that might use the connection.

Correct Answer

verifed

verified

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?


A) File Transfer Protocol (FTP)
B) FTP Secure (FTPS)
C) Secure FTP (SFTP)
D) Trivial FTP (TFTP)

Correct Answer

verifed

verified

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?


A) A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
B) An organization wishes to gain access to applications through an online user interface, while maintaining compatibility across operating systems.
C) An organization needs to have a hosted virtual network infrastructure for their services, which are run on virtual machines.
D) A small organization needs to have high availability for their web server.

Correct Answer

verifed

verified

How does public key encryption work?

Correct Answer

verifed

verified

In public key encryption, data is encryp...

View Answer

What is NOT a potential disadvantage of utilizing virtualization?


A) Multiple virtual machines contending for finite resources can compromise performance.
B) Increased complexity and administrative burden can result from the use of virtual machines.
C) Licensing costs can be high due to every instance of commercial software requiring a separate license.
D) Virtualization software increases the complexity of backups, making creation of usable backups difficult.

Correct Answer

verifed

verified

Describe the TLS/SSL handshake process as initiated by a web client accessing a secure website.

Correct Answer

verifed

verified

Given the scenario of a browser accessin...

View Answer

At what layer of the OSI model does the IPsec encryption protocol operate?


A) Physical layer
B) Network layer
C) Transport layer
D) Application layer

Correct Answer

verifed

verified

All types of remote access techniques connecting to a network require at least one of what two different types of remote access server?

Correct Answer

verifed

verified

There are two types of remote access ser...

View Answer

FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.

Correct Answer

verifed

verified

The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.

Correct Answer

verifed

verified

Why is the DTLS (Datagram Transport Layer Security) protocol used for streaming applications that need security?

Correct Answer

verifed

verified

DTLS is a variant of TLS that is designe...

View Answer

The combination of a public key and a private key are known by what term below?


A) key set
B) key team
C) key pair
D) key tie

Correct Answer

verifed

verified

VMware Player and Linux KVM are both examples of what type of hypervisor?


A) Type 1 hypervisor
B) Type 2 hypervisor
C) barebones hypervisor
D) bare-metal hypervisor

Correct Answer

verifed

verified

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?


A) SSH provides a graphical view of the remote computer.
B) SSH does not protect against DNS spoofing.
C) SSH does not protect against IP spoofing.
D) SSH supports port forwarding.

Correct Answer

verifed

verified

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?


A) VPN proxy
B) VPN server
C) VPN transport
D) VPN gateway

Correct Answer

verifed

verified

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

Correct Answer

verifed

verified

A community cloud is a service shared between multiple organizations, but not available publicly.

Correct Answer

verifed

verified

What is the PPP (Point-to-Point Protocol), and how does it work?

Correct Answer

verifed

verified

PPP (Point-to-Point Protocol) is a Data ...

View Answer

Why is the telnet utility a poor choice for remote access to a device?


A) It provides no mechanism for authentication.
B) It does not allow for control of a computer remotely.
C) It cannot be used over a public WAN connection.
D) It provides poor authentication and no encryption.

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer