Lesson 7 Virtualization and Cloud Computing

Lesson 7 Virtualization and Cloud Computing

11th Grade

59 Qs

quiz-placeholder

Similar activities

MIL 1st Quarter Exam

MIL 1st Quarter Exam

11th - 12th Grade

60 Qs

Air Pollution and Climate Change

Air Pollution and Climate Change

9th - 12th Grade

63 Qs

TMK TAHUN 5

TMK TAHUN 5

11th Grade

64 Qs

SOAL UTS KELAS 11 TKJ 1

SOAL UTS KELAS 11 TKJ 1

11th Grade

58 Qs

Sociology Exam

Sociology Exam

11th Grade

62 Qs

Zoology Fall Final - MC

Zoology Fall Final - MC

9th - 12th Grade

54 Qs

Quiz Fiber Optik

Quiz Fiber Optik

11th Grade

60 Qs

L4 Network Protocols & Routing

L4 Network Protocols & Routing

11th Grade

54 Qs

Lesson 7 Virtualization and Cloud Computing

Lesson 7 Virtualization and Cloud Computing

Assessment

Quiz

Other

11th Grade

Hard

Created by

Christina Bright

Used 2+ times

FREE Resource

59 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a task that a VPN concentrator is responsible for?

A VPN concentrator authenticates VPN clients.

A VPN concentrator manages encryption for VPN transmissions.

A VPN concentrator shuts down established connections with malicious traffic occurs.

A VPN concentrator establishes tunnels for VPN connections.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

Dynamic Multipoint VPN

Auto Switched VPN Service

Symmetric VPN Autodial

Dynamic SmartVPN

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?

File Transfer Protocol (FTP)

Trivial FTP (TFTP)

Secure FTP (SFTP)

FTP Secure (FTPS)

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

VNC is faster than Remote Desktop, and requires less network bandwidth.

VNC is open source, allowing companies to develop their own software based on VNC.

VNC uses the Remote Desktop Protocol (RDP).

VNC is a standard developed by Microsoft and used by Windows Remote Desktop.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In order to generate a public and private key for use with SSH, what command line utility should you use?

ssh-keygen

key-generate

ssh-newkey

gpg --ssh

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

SSH provides a graphical view of the remote computer.

SSH does not protect against DNS spoofing

SSH does not protect against IP spoofing.

SSH supports port forwarding.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is the telnet utility a poor choice for remote access to a device?

It provides no mechanism for authentication.

It cannot be used over a public WAN connection.

It provides poor authentication and no encryption.

It does not allow for control of a computer remotely.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?