Module 10 Flashcards
Which of the following virtualizes parts of a physical network?
- SDN
- SDV
- SDX
- SDA
SDN
A software-defined network (SDN) virtualizes parts of the physical network so that it can be more quickly and easily reconfigured. This is accomplished by separating the control plane from the data plane.
Aleksandra, the company HR manager, is completing a requisition form for the IT staff to create a type of cloud that would only be accessible to other HR managers like Aleksandra who are employed at manufacturing plants. The form asks for the type of cloud that is needed. Which type of cloud would best fit Aleksandra’s need?
- Public cloud
- Group cloud
- Community cloud
- Hybrid cloud
Community cloud
A community cloud is a cloud that is open only to specific organizations that have common concerns.
Which type of hypervisor runs directly on the computer’s hardware?
- Type IV
- Type II
- Type III
- Type I
Type I
Type I hypervisors run directly on the computer’s hardware instead of the underlying operating system. Type I hypervisors are sometimes called “native” or “bare metal” hypervisors.
Oliwia has been given a project to manage the development of a new company app. She wants to use a cloud model to facilitate the development and deployment. Which cloud model will she choose?
- IaaS
- PaaS
- XaaS
- SaaS
Platform as a Service (PaaS) provides a software platform on which the enterprise or users can build their own applications and then host them on the PaaS provider’s infrastructure. The software platform can be used as a development framework to build and debug the app and then deploy it.
What does the term “serverless” mean in cloud computing?
- Server resources of the cloud are inconspicuous to the end user.
- The cloud network configuration does not require any servers.
- All appliances are virtual and do not interact with physical servers.
- Servers are run as VMs.
-Server resources of the cloud are inconspicuous to the end user.
Serverless infrastructure is one in which the capacity planning, installation, setup, and management are all invisible to the user because they are handled by the cloud provider. Because the server resources of the cloud are inconspicuous to the end user, this type of infrastructure is called “serverless.”
In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply?
- Containers use hardware hypervisors for virtualization
- Containers use dedicated physical storage for virtualization
- Containers use Type I hypervisors for virtualization
- Containers use OS components for virtualization
-Containers use OS components for virtualization “Containers use OS components like binaries and libraries for virtualization.”
David is asked to test a new configuration on a virtual machine; if it does not work, it should roll back to the older state. What should David do before testing the new configuration so he can roll it back to the previous state if needed?
- Enable “roll back” on the previous configuration before testing the new configuration
- Take a snapshot of the virtual machine before testing the configuration
- Use sandboxing in the virtual machine before testing the configuration
- Take a screenshot of the virtual machine before testing the configuration
-Take a snapshot of the virtual machine before testing the configuration
Taking a snapshot of the virtual machine (VM) before testing the configuration will allow it to be rolled back to the snapshot if the configuration is not working.
In an interview, you were asked to briefly describe how emails containing malware or other contents are prevented from being delivered. Which of the following should be your reply?
- X.500 prevents unwanted mails from being delivered.
- LDAP prevents unwanted mails from being delivered.
- Mail gateways prevent unwanted mails from being delivered.
- SMTP relays prevent unwanted mails from being delivered.
Mail gateways monitor emails for unwanted content and prevent these messages from being delivered.
Which of the following protocol can be used for secure routing and switching?
- IPsec
- HTTPS
- HTTP
- DNSSEC
Internet protocol security (IPSec) is a secure network protocol that authenticates and encrypts the data.
What is a Type I hypervisor?
- A hypervisor that runs on security devices
- A hypervisor that uses binary files for virtualization
- A hypervisor that runs on host operating system
- A hypervisor that runs directly on computer hardware
A Type I hypervisor runs directly on computer hardware.
Marnus is working as a cloud administrator, and he has been asked to perform segmentation on specific cloud networks. Which of the following should be done by Marnus?
-Use automated inspection and integration services for authentication, authorization, encryption,
availability, and policy compliance.
-Create network rules for the services permitted between accessible zones to make sure endpoints belonging to other approved zones can reach them.
-Create a virtual network that connects services and resources such as virtual machines and database applications.
-Remove individual accounts on file servers, machines, or authentication servers to restrict access and free up disc space, ports, and certificates.
-Create network rules for the services permitted between accessible zones to make sure endpoints belonging to other approved zones can reach them.
Segmentation sets rules for accessing different services.
You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected?
- Implement virtual machine escape protection
- Deactivate the host OS while the guest OS is running
- Implement a secure network gateway
- Assign different virtual networks for the guest OS and host OS
-Implement virtual machine escape protection
On implementing virtual machine escape protection, the virtual machine (VM) cannot directly interact with the host operating system and potentially infect it.
You are a cloud administrator, and you are asked to configure a VPC such that backend servers are not publicly accessible. What should you do to achieve this goal?
- Use private subnets for backend servers
- Implement audit logging on backend servers
- Deploy the backend servers on premises
- Deploy backend servers in different availability zones
-Use private subnets for backend servers
Backend servers can be configured with a private subnet to restrict public access.
Which of the following protocols can be used for secure video and voice calling?
- SRTP
- S/MIME
- VPN
- SNMP
The secure real-time transfer protocol (SRTP) provides encryption, authentication, and integrity for voice and video technology.
Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network. Which of the following should be done by Pat?
- Implement subnetting
- Use virtual desktop infrastructure
- Use a software-device network
- Use software-device visibility
“Software-device visibility” is a framework used for automating critical security functions.