Module 10 Flashcards
Which of the following virtualizes parts of a physical network?
- SDN
- SDV
- SDX
- SDA
SDN
A software-defined network (SDN) virtualizes parts of the physical network so that it can be more quickly and easily reconfigured. This is accomplished by separating the control plane from the data plane.
Aleksandra, the company HR manager, is completing a requisition form for the IT staff to create a type of cloud that would only be accessible to other HR managers like Aleksandra who are employed at manufacturing plants. The form asks for the type of cloud that is needed. Which type of cloud would best fit Aleksandra’s need?
- Public cloud
- Group cloud
- Community cloud
- Hybrid cloud
Community cloud
A community cloud is a cloud that is open only to specific organizations that have common concerns.
Which type of hypervisor runs directly on the computer’s hardware?
- Type IV
- Type II
- Type III
- Type I
Type I
Type I hypervisors run directly on the computer’s hardware instead of the underlying operating system. Type I hypervisors are sometimes called “native” or “bare metal” hypervisors.
Oliwia has been given a project to manage the development of a new company app. She wants to use a cloud model to facilitate the development and deployment. Which cloud model will she choose?
- IaaS
- PaaS
- XaaS
- SaaS
Platform as a Service (PaaS) provides a software platform on which the enterprise or users can build their own applications and then host them on the PaaS provider’s infrastructure. The software platform can be used as a development framework to build and debug the app and then deploy it.
What does the term “serverless” mean in cloud computing?
- Server resources of the cloud are inconspicuous to the end user.
- The cloud network configuration does not require any servers.
- All appliances are virtual and do not interact with physical servers.
- Servers are run as VMs.
-Server resources of the cloud are inconspicuous to the end user.
Serverless infrastructure is one in which the capacity planning, installation, setup, and management are all invisible to the user because they are handled by the cloud provider. Because the server resources of the cloud are inconspicuous to the end user, this type of infrastructure is called “serverless.”
In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply?
- Containers use hardware hypervisors for virtualization
- Containers use dedicated physical storage for virtualization
- Containers use Type I hypervisors for virtualization
- Containers use OS components for virtualization
-Containers use OS components for virtualization “Containers use OS components like binaries and libraries for virtualization.”
David is asked to test a new configuration on a virtual machine; if it does not work, it should roll back to the older state. What should David do before testing the new configuration so he can roll it back to the previous state if needed?
- Enable “roll back” on the previous configuration before testing the new configuration
- Take a snapshot of the virtual machine before testing the configuration
- Use sandboxing in the virtual machine before testing the configuration
- Take a screenshot of the virtual machine before testing the configuration
-Take a snapshot of the virtual machine before testing the configuration
Taking a snapshot of the virtual machine (VM) before testing the configuration will allow it to be rolled back to the snapshot if the configuration is not working.
In an interview, you were asked to briefly describe how emails containing malware or other contents are prevented from being delivered. Which of the following should be your reply?
- X.500 prevents unwanted mails from being delivered.
- LDAP prevents unwanted mails from being delivered.
- Mail gateways prevent unwanted mails from being delivered.
- SMTP relays prevent unwanted mails from being delivered.
Mail gateways monitor emails for unwanted content and prevent these messages from being delivered.
Which of the following protocol can be used for secure routing and switching?
- IPsec
- HTTPS
- HTTP
- DNSSEC
Internet protocol security (IPSec) is a secure network protocol that authenticates and encrypts the data.
What is a Type I hypervisor?
- A hypervisor that runs on security devices
- A hypervisor that uses binary files for virtualization
- A hypervisor that runs on host operating system
- A hypervisor that runs directly on computer hardware
A Type I hypervisor runs directly on computer hardware.
Marnus is working as a cloud administrator, and he has been asked to perform segmentation on specific cloud networks. Which of the following should be done by Marnus?
-Use automated inspection and integration services for authentication, authorization, encryption,
availability, and policy compliance.
-Create network rules for the services permitted between accessible zones to make sure endpoints belonging to other approved zones can reach them.
-Create a virtual network that connects services and resources such as virtual machines and database applications.
-Remove individual accounts on file servers, machines, or authentication servers to restrict access and free up disc space, ports, and certificates.
-Create network rules for the services permitted between accessible zones to make sure endpoints belonging to other approved zones can reach them.
Segmentation sets rules for accessing different services.
You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected?
- Implement virtual machine escape protection
- Deactivate the host OS while the guest OS is running
- Implement a secure network gateway
- Assign different virtual networks for the guest OS and host OS
-Implement virtual machine escape protection
On implementing virtual machine escape protection, the virtual machine (VM) cannot directly interact with the host operating system and potentially infect it.
You are a cloud administrator, and you are asked to configure a VPC such that backend servers are not publicly accessible. What should you do to achieve this goal?
- Use private subnets for backend servers
- Implement audit logging on backend servers
- Deploy the backend servers on premises
- Deploy backend servers in different availability zones
-Use private subnets for backend servers
Backend servers can be configured with a private subnet to restrict public access.
Which of the following protocols can be used for secure video and voice calling?
- SRTP
- S/MIME
- VPN
- SNMP
The secure real-time transfer protocol (SRTP) provides encryption, authentication, and integrity for voice and video technology.
Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network. Which of the following should be done by Pat?
- Implement subnetting
- Use virtual desktop infrastructure
- Use a software-device network
- Use software-device visibility
“Software-device visibility” is a framework used for automating critical security functions.
Which of the following provides the highest level of security?
- SFTP
- FTP
- FTPS
- XFTP
Secure FTP (SFTP) uses only a single TCP port instead of two ports like FTPS and encrypts and compresses all data and commands.
Which of the following is true about secrets management?
- It can only be used on-prem for security but has a connection to the cloud.
- It provides a central repository.
- It cannot be audited for security purposes.
- It requires AES-512.
A secrets manager provides a “central repository” and single source to manage, access, and audit secrets across a cloud infrastructure.
Which of the following is NOT a feature of a next-generation SWG?
- Send alerts to virtual firewalls
- Analyze traffic encrypted by SSL
- Can be placed on endpoints, at the edge, or in the cloud
- DLP
Correct. Alerts are not sent to virtual firewalls; in reality, they could be sent from a virtual firewall to the SWG.
Zuzana is creating a report for her supervisor about the cost savings associated with cloud computing. Which of the following would she NOT include on her report on the cost savings?
- Resiliency
- Scalability
- Pay-per-use
- Reduction in broadband costs
Correct. Cloud computing does not reduce broadband costs and may increase them.
Your enterprise recently decided to hire new employees as work-from-home interns. For the new employees to work from home, you need to create a network that will allow them to securely access enterprise data from remote locations.
Which of the following protocols should you use?
- VPN
- SNMP
- S/MIME
- FTPS
Correct. Creating a virtual private network using VPN protocol allows remote access with encryption and authentication.
In an interview, you are asked about the role played by virtual machines in load balancing. Which of the following should be your reply?
- If the virtual machine’s load increases, the virtual machines can balance the load by denying further access.
- If the load on a virtual machine increases, the RAM or disk space of the VM can be extended until the load is balanced.
- If the load on a virtual machine increases, the virtual machine can balance the load by rejecting low-priority requests.
- If the virtual machine’s load increases, the virtual machine can be migrated to another physical machine with more capabilities.
Correct. A virtual machine can be easily migrated to another physical device with more capabilities when the load increases.
You are asked to transfer a few confidential enterprise files using the file transfer protocol (FTP). For ensuring utmost security, which variant of FTP should you choose?
- SFTP
- FTPS
- TFTP
- FTP
Correct. The SSH file transfer protocol (SFTP) encrypts and compresses all data and commands to provide utmost security.
Kane was transferring files from a file transfer protocol (FTP) server to his local machine simultaneously. He sniffed the traffic to find that only the control port commands are encrypted, and the data port is not encrypted. What protocol did Kane use to transfer the files?
- FTP
- FTPS
- TFTP
- SFTP
Correct. The file transfer protocol secure (FTPS) will sometimes not encrypt the data port, which makes it less secure than the SSH file transfer protocol (SFTP).
Mike, an employee at your company, approached you seeking help with his virtual machine. He wants to save the current state of the machine to roll back to the saved state in case of a malfunction. Which of the following techniques can help Mike?
- Take snapshots to save the virtual machine state
- Use containers to save the virtual machine state
- Apply sandboxing to save the virtual machine state
- Use LDAP to save the virtual machine state
Correct. Saved snapshots allow a virtual machine to roll back to the state when the snapshot was taken.