Certmaster Summarizing Cloud and Datacenter Architecture Flashcards
A network consultant is considering what technologies to use when adding a storage area network (SAN). What are the two most popular SAN connection types? (Select all that apply.)
A.Hypervisor
B.Fibre Channel
C.Fibre Channel over Ethernet
D.iSCSI
B, D
Fibre Channel is a high-speed network technology specifically designed for connecting storage devices, servers, and other networked devices in a SAN. It provides high performance, low latency, and dedicated bandwidth for storage traffic.
iSCSI is a storage networking protocol that allows block-level storage to be transmitted over Ethernet networks. It uses IP networks to provide storage connectivity, making it more accessible and cost-effective compared to dedicated Fibre Channel networks.
A hypervisor is a technology that allows multiple virtual machines to run on a single physical machine. While hypervisors can interact with storage, they are not SAN connection types themselves.
Fibre Channel over Ethernet (FCoE) is a technology that encapsulates Fibre Channel frames within Ethernet frames. It’s a way to carry Fibre Channel traffic over Ethernet networks, but it’s not as widely used as traditional Fibre Channel or iSCSI.
A cyber architect is reviewing the topologies that support the east-west activity for the software-defined networking model. Which topology contains access switches?
A.Spine
B.Leaf
C.Datacenter
D.Control Layer
B
The leaf layer contains access switches. Each access switch connects to every spine switch in a full mesh topology. The access switches never have direct connections to one another.
The spine layer comprises a backbone of top-tier switches. Note that while this is known as a backbone, the spine switches are not linked.
A datacenter is a site dedicated to provisioning server resources.
The principal innovation of SDN is to insert a control layer between the application layer and the infrastructure layer. The functions of the control plane are implemented by a virtual device referred to as the SDN controller.
A network architect analyzes the software-designed networking model and reviews the layer that exposes an application programming interface (API) that can be automated by scripts that call functions in the layer above or below. What is the appropriate layer for this description?
A.OSI Network Layer 3
B.Spine
C.Leaf
D.Control Layer
D
The principal innovation of SDN is to insert a control layer between the application layer and the infrastructure layer. The functions of the control plane are implemented by a virtual device referred to as the SDN controller.
The network layer (layer 3) is responsible for moving data around a network, known as an internetwork or the Internet.
The spine layer comprises a backbone of top-tier switches. Note that while this is known as a backbone, the spine switches are not linked.
The leaf layer contains access switches. Each access switch connects to every spine switch in a full mesh topology. The access switches never have direct connections to one another.
A network architect analyzes the software-defined networking model and reviews the layer that applies the business logic to decide how to prioritize traffic, secure data, and where to switch data. What is the appropriate layer for this description?
A.OSI Network Layer 3
B.Application layer
C.Infrastructure Layer
D.Control Layer
B
The application layer applies the business logic to decide how to prioritize traffic and secure data and where the data should switch.
The network layer (layer 3) is responsible for moving data around a network, known as an internetwork or the Internet.
The infrastructure layer contains devices (physical or virtual) that handle the actual forwarding (switching and routing) of traffic and imposition of ACLs and other policy configurations for security.
The principal innovation of SDN is to insert a control layer between the application layer and the infrastructure layer.
The functions of the control plane are implemented by a virtual device referred to as the SDN controller.
While looking for a cloud deployment model for business operations, the network specialist looks for a completely private model owned by the organization. Which cloud deployment model meets the network specialist’s and businesses’ needs?
A.Public (or multitenant)
B.Hosted Private
C.Private Cloud
D.Community
C
In a private cloud model, the cloud infrastructure is entirely private to and owned by the organization. In this case, there is likely to be one business unit dedicated to managing the cloud while other business units use it.
With a public or multitenant model, the businesses can use subscriptions or pay-as-you-go financing while at the same time providing lower-tier services free of charge.
A third party hosts the hosted private model for the exclusive use of the organization. This is more secure and can guarantee a better level of performance, but it is correspondingly more expensive.
In a community cloud model, several organizations share the costs of either a hosted private or fully private cloud.
During work, a network specialist uses an IP tunneling protocol to transfer SCSI data over an IP-based network. iSCSI can be used to link SANs but also is an alternative to which of the following?
A.Virtual NICS
B.Fibre Channel
C.SAN
D.Hypervisor
B
Fibre Channel is in the T11 ANSI standard. The deliberate British spelling of “fibre” distinguishes the standard from fiber optic cabling, which it often uses but does not rely on.
Within the VM, the virtual NIC (vNIC) will look exactly like an ordinary network adapter and will be configurable in the same way.
A storage area network (SAN) provisions access to storage devices at the block level. Each read or write operation addresses the actual location of data on the media (Block I/O).
In a virtualization host, the hypervisor—or virtual machine monitor (VMM)—manages the virtual environment and facilitates interaction with the computer hardware and network.
When configuring connectivity with a virtual switch that bridges the virtual and physical networks via the host computer’s physical NIC, a network engineer creates a virtual switch that binds to the host’s NIC to allow the VM to communicate on the physical network. What switch did the network engineer create?
A.SAN
B.External
C.Virtual NICS
D.Hypervisor
B
External switches bind to the host’s NIC to allow the VM to communicate on the physical network.
A storage area network (SAN) provisions access to storage devices at the block level. Each read or write operation addresses the actual location of data on the media (Block I/O).
Within the VM, the virtual NIC (vNIC) will look exactly like an ordinary network adapter and will be configurable in the same way.
In a virtualization host, the hypervisor—or virtual machine monitor (VMM)—manages the virtual environment and facilitates interaction with the computer hardware and network. One distinction between virtual platforms is between host and bare metal methods of interacting with the host hardware.
A network architect analyzes the software-defined networking model and reviews the layer that handles the actual forwarding (switching and routing) of traffic and imposition of ACLs and other policy configurations for security. What is the appropriate layer for this description?
A.OSI Network Layer 3
B.Datacenter
C.Infrastructure Layer
D.Leaf
C
The infrastructure layer contains devices (physical or virtual) that handle the actual forwarding (switching and routing) of traffic and imposition of ACLs and other policy configurations for security.
The network layer (layer 3) is responsible for moving data around a network, known as an internetwork or the Internet.
A datacenter is a site dedicated to provisioning server resources. The datacenter hosts network services (such as authentication, addressing, and name resolution), application servers, and storage area networks (SANs).
The leaf layer contains access switches. Each access switch connects to every spine switch in a full mesh topology. The access switches never have direct connections to one another.
While looking for a cloud service model for business, the network specialist looks for a model that allows the organization to rent components and internet links on an as-needed basis from the service provider’s datacenter. Which cloud service model meets the network specialist’s and businesses’ needs?
A.Infrastructure as a Service
B.Software as a Service
C.Public (or multitenant)
D.Community
A
Infrastructure as a Service (IaaS) quickly provides rentable IT resources such as servers, load balancers, and storage area network (SAN) components.
Software as a Service (SaaS) is a different model of provisioning software applications. Rather than purchasing software licenses for a given number of seats, a business would access software hosted on a supplier’s servers on a pay-as-you-go or lease arrangement (on-demand).
With a public or multitenant model, the companies can use subscriptions or pay-as-you-go financing while at the same time providing lower-tier services free of charge.
In a community cloud model, several organizations share the costs of either a hosted private or fully private cloud. This can pool resources for common concerns, like standardization and security policies.
While looking for a cloud deployment model for business operations, the network specialist looks for a model that offers pay-as-you-go financing. Which cloud deployment model meets the network specialist’s and businesses’ needs?
A.Public (or multitenant)
B.Hosted Private
C.Private
D.Community
A
With the public or multitenant model, the businesses can use subscriptions or pay-as-you-go financing while at the same time providing lower-tier services free of charge.
A third party hosts the hosted private model for the exclusive use of the organization. This is more secure and can guarantee a better level of performance, but it is correspondingly more expensive.
In a private cloud model, the cloud infrastructure is completely private to and owned by the organization.
In a community cloud model, several organizations share the costs of either a hosted private or fully private cloud. This can pool resources for common concerns, like standardization and security policies.
A network engineer is configuring a switch to make it only usable to the VMs. The engineer confirms that they cannot use the switch to communicate with the host. What type of switch is the engineer configuring?
A.Internal
B.External
C.Private
D.Hypervisor
C
Private switches create a switch that is usable only by the VMs. They cannot use the switch to communicate with the host.
Internal switches create a bridge that is usable only by VMs on the host and the host itself. This type of switch does not permit access to the wider physical network.
External switches bind to the host’s NIC to allow the VM to communicate on the physical network.
In a virtualization host, the hypervisor—or virtual machine monitor (VMM)—manages the virtual environment and facilitates interaction with the computer hardware and network. One distinction between virtual platforms is between host and bare metal methods of interacting with the host hardware.