Chapter 9 ■ Network Services, Virtualization, and Cloud Computing Flashcards
- Your company hosts its own web server, and it allows consumers to make purchases via the
server. The help line has been getting complaints that users are unable to access the secure
portion of the website. You open the site and it seems fine, although the secure portion
where transactions are completed is inaccessible. What is the most likely cause?
A. The firewall is blocking TCP port 80.
B. The firewall is blocking TCP port 443.
C. The security module of the web server is malfunctioning.
D. The web server is down.
B. The firewall is blocking TCP port 443.
- Your manager wants you to install a networked Internet appliance that prevents network
traffic–based attacks and includes anti-malware and anti-spam software. What should you
install?
A. NIPS
B. NIDS
C. UTM
D. Endpoint management system
C. UTM
- You are installing a file server for the accounting department. Where should this file server
be located on the network?
A. Outside of the firewall
B. In the DMZ
C. In the secure network
D. On the router
C. In the secure network
- You have been asked to identify the right type of cloud service to help the team of developers
to provide programming elements such as runtime environments. Which service do you
recommend?
A. PaaS
B. IaaS
C. SaaS
D. DaaS
A. PaaS
- Which of the following are services that a print server should provide? (Choose two.)
A. Accepting print jobs from clients
B. Turning off printers on demand
C. Providing clients with the appropriate printer driver during installation
D. Notifying users when the print job is complete
A. Accepting print jobs from clients
C. Providing clients with the appropriate printer driver during installation
- You are setting up a cloud contract with a provider. Your team needs the ability to increase
capacity without intervention from the provider. What do you request?
A. Rapid elasticity
B. On-demand self-service
C. Resource pooling
D. Measured service
B. On-demand self-service
- Which type of server is responsible for preventing users from accessing websites with
objectionable
content?
A. Proxy
B. Web
C. DHCP
D. DNS
A. Proxy
- Your company wants to move to a cloud provider to be able to scale resources quickly, but
it is concerned about the security of confidential information. Which of the following types
of cloud models might be the most appropriate for your company?
A. Public
B. Private
C. Community
D. Hybrid
D. Hybrid
- What does a DHCP server need to be configured with to operate properly?
A. DNS server
B. Scope
C. Range
D. DHCP relay agent
D. DHCP relay agent
- You have been asked to advise a group of several universities that want to combine research
efforts and store data in the cloud. Which type of cloud solution might be best for them?
A. Public
B. Private
C. Community
D. Hybrid
D. Hybrid
- When configuring a DNS server, administrators must create which of the following?
A. Zone file
B. Hosts file
C. Scope file
D. DNS proxy
A. Zone file
- Your manager wants to use the cloud because everyone seems to be talking about it. What
should you include when you are listing the benefits of using the cloud? (Choose all that
apply.)
A. Increased security
B. Increased scalability
C. Lower cost
D. Improved reliability
B. Increased scalability
C. Lower cost
D. Improved reliability
- You are configuring two email servers on your company’s network. Which network
protocol
do the servers use to transfer mail to each other?
A. POP3
B. IMAP4
C. SNMP
D. SMTP
C. SNMP
- You have been asked to configure a client-side virtualization solution with three guest OSs.
Each one needs Internet access. How should you configure the solution in the most costeffective
way?
A. Three physical NICs
B. One physical NIC, three virtual NICs, and one virtual switch
C. One physical NIC, one virtual NIC, and three virtual switches
D. One physical NIC, three virtual NICs, and three virtual switches
B. One physical NIC, three virtual NICs, and one virtual switch
- Which record type on a DNS server represents an IPv6 host?
A. A
B. MX
C. CNAME
D. AAAA
D. AAAA
- You have been asked to install Linux in a VM on a Windows 10 client. The Windows 10
client needs 4 GB RAM, and Linux needs 2 GB RAM. How much RAM does the system
need at a minimum?
A. 4 GB
B. 6 GB
C. 8 GB
D. Unable to determine from the question
B. 6 GB
- A computer using which of the following would be considered a legacy device? (Choose all
that apply.)
A. A 386 processor
B. The IPX/SPX protocol
C. An application developed in 1983
D. Only 1 GB RAM
A. A 386 processor
B. The IPX/SPX protocol
C. An application developed in 1983
- You have been asked to set up client-side virtualization on an office computer. The host OS
is Windows 7, and there will be three Windows 7 guest OSs. Which of the following is true
about the need for antivirus security?
A. The host OS needs an antivirus program, but virtual machines can’t be affected by
viruses.
B. The host OS antivirus software will also protect the guest OSs on the VMs.
C. Installing antivirus software on the virtual switch will protect all guest OSs.
D. The host OS and each guest OS need their own antivirus software installed.
D. The host OS and each guest OS need their own antivirus software installed.
- You have been asked by your manager to brief the group on security appliances. What is
the difference between IDS and IPS?
A. IDS is active, whereas IPS is passive.
B. IDS is passive, whereas IPS is active.
C. IDS monitors internal network traffic, whereas IPS monitors traffic coming from the Internet.
D. IDS monitors traffic coming from the Internet, whereas IPS monitors internal network traffic.
D. IDS monitors traffic coming from the Internet, whereas IPS monitors internal network
traffic.
- You have been asked to set up client-side virtualization on a computer at work. The manager
asks for a Type 2 hypervisor. What is the disadvantage of using that type of hypervisor?
A. The guest OS will compete for resources with the host OS.
B. The guest OS will be forced to a lower priortity with the CPU than the host OS.
C. The guest OS will be forced to use less RAM than the host OS.
D. The virtual guest OS will not be able to get on the physical network.
A. The guest OS will compete for resources with the host OS.