SG: Ch 9: Network Services, Virtualization, and Cloud Computing Flashcards
You have been asked to configure a client-side virtualization solution with three guest OSs. Each one needs Internet access. How should you configure the solution in the most cost-effective way?
A. Three physical NICs
B. One physical NIC, three virtual NICs, and one virtual switch
C. One physical NIC, one virtual NIC, and three virtual switches
D. One physical NIC, three virtual NIC, and three virtual switches
B. One physical NIC, three virtual NICs, and one virtual switch
Each virtual machine will use its own virtual NIC. The virtual NICs will communicate with a virtual switch managed by the hypervisor. The virtual switch will communicate with the physical NIC.
You have been asked to set up client-side virtualization on a computer at work. The manager asks for a Type 2 hypervisor. What is the disadvantage of using that type of hypervisor?
A. The guest OS will compete for resources with the host OS.
B. The guest OS will be forced to a lower priortity with the CPU than the host OS.
C. The guest OS will be forced to use less RAM than the host OS.
D. The virtual guest OS will not be able to get on the physical network.
A. The guest OS will compete for resources with the host OS.
A Type 2 hypervisor sits on top of an existing OS, meaning that OSs installed in VMs will compete for resources with the host OS. The amount of resources available to a guest OS can be configured. Virtual OSs can get on the physical network if configured properly.
You have been asked to identify the right type of cloud service to help the team of developers to provide programming elements such as runtime environments. Which service do you recommend?
A. PaaS
B. IaaS
C. SaaS
D. DaaS
A. PaaS
Platform as a Service (PaaS) is probably the right level of service for the developer team. It provides infrastructure, like IaaS, and also supplies needed programming elements.
Your manager wants to use the cloud because everyone seems to be talking about it. What should you include when you are listing the benefits of using the cloud? (Choose all that apply.)
A. Increased security
B. Increased scalability
C. Lower cost
D. Improved reliability
B. Increased scalability
C. Lower cost
D. Improved reliability
Cloud solutions are great for enhancing scalability and reliability while generally lowering costs. The biggest issue with cloud computing is security.
Your manager wants you to install a networked Internet appliance that prevents network traffic–based attacks and includes anti-malware and anti-spam software. What should you install?
A. NIPS
B. NIDS
C. UTM
D. Endpoint management system
C. UTM
It sounds like the manager wants a unified threat management (UTM) device. They are designed to be one-stop network protection devices. Networked intrusion detection and prevention systems will detect network attacks but do not have anti-malware or anti-spam capabilities. An endpoint management system is not a security appliance.
You have been asked to advise a group of several universities that want to combine research efforts and store data in the cloud. Which type of cloud solution might be best for them?
A. Public
B. Private
C. Community
D. Hybrid
C. Community
When multiple organizations with similar objectives want to combine efforts in a cloud, the best choice is generally a community cloud. This allows for the flexibility and scalability normally found in a public cloud, but it also limits the number of users to a smaller, trusted group.
You are configuring two email servers on your company’s network. Which network protocol do the servers use to transfer mail to each other?
A. POP3
B. IMAP4
C. SNMP
D. SMTP
D. SMTP
Simple Mail Transfer Protocol (SMTP) is used to transfer email between servers. POP3 and IMAP4 are used to download email. SNMP is Simple Network Management Protocol and not related to email.
You have been asked to set up client-side virtualization on an office computer. The host OS is Windows 7, and there will be three Windows 7 guest OSs. Which of the following is true about the need for antivirus security?
A. The host OS needs an antivirus program, but virtual machines can’t be affected by viruses.
B. The host OS antivirus software will also protect the guest OSs on the VMs.
C. Installing antivirus software on the virtual switch will protect all guest OSs.
D. The host OS and each guest OS need their own antivirus software installed.
D. The host OS and each guest OS need their own antivirus software installed.
Each instance of the OS you are running requires its own security software.
What does a DHCP server need to be configured with to operate properly?
A. DNS server
B. Scope
C. Range
D. DHCP relay agent
B. Scope
Every DHCP server needs to have a scope, which is the range of addresses available to clients, as well as other options that it can give to client computers. A DHCP server can optionally provide clients with the address of a DNS server. There is no DHCP range. A DHCP relay agent is a system configured on a subnet with no DHCP server that relays DHCP requests to the DHCP server.
You are setting up a cloud contract with a provider. Your team needs the ability to increase capacity without intervention from the provider. What do you request?
A. Rapid elasticity
B. On-demand self-service
C. Resource pooling
D. Measured service
B. On-demand self-service
The ability to expand services without provider intervention is called on-demand self-service. Rapid elasticity means you can quickly increase capacity, but it usually requires supplier intervention. Resource pooling is taking resources from multiple machines and making them available as one pool. Measured service is how many suppliers track usage and charge accordingly.
Which record type on a DNS server represents an IPv6 host?
A. A
B. MX
C. CNAME
D. AAAA
D. AAAA
The AAAA (quad A) record is used to represent IPv6 hosts. IPv4 hosts need an A record. The CNAME record is used if one host has alias (multiple) names. MX is for a mail server.
You are installing a file server for the accounting department. Where should this file server be located on the network?
A. Outside of the firewall
B. In the DMZ
C. In the secure network
D. On the router
C. In the secure network
If the data on the server does not need to be accessed via the Internet, then the server should be in the most secure place possible, which is inside the firewall(s) in the secure network.
You have been asked to install Linux in a VM on a Windows 10 client. The Windows 10 client needs 4 GB RAM, and Linux needs 2 GB RAM. How much RAM does the system need at a minimum?
A. 4 GB
B. 6 GB
C. 8 GB
D. Unable to determine from the question
B. 6 GB
There needs to be enough RAM to support both OSs, so the answer is 6 GB. More is better, though!
When configuring a DNS server, administrators must create which of the following?
A. Zone file
B. Hosts file
C. Scope file
D. DNS proxy
A. Zone file
DNS server records are contained in the zone file, which must be configured by administrators. A hosts file is an alternative to using DNS (but that does not work well when scaling to the Internet). A scope is created on DHCP servers. There is no DNS proxy.
You have been asked by your manager to brief the group on security appliances. What is the difference between IDS and IPS?
A. IDS is active, whereas IPS is passive.
B. IDS is passive, whereas IPS is active.
C. IDS monitors internal network traffic, whereas IPS monitors traffic coming from the Internet.
D. IDS monitors traffic coming from the Internet, whereas IPS monitors internal network traffic.
B. IDS is passive, whereas IPS is active.
IDS devices are passive. They will detect, log, and perhaps send an alert, but that’s it. An IPS can take active steps to shut down an attack if it detects one. Both devices will monitor internal network traffic as well as incoming traffic.