Ch.7 Network+ Test

9 September 2022
4.7 (114 reviews)
40 test answers

Unlock all answers in this set

Unlock answers (36)
question
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
answer
true
question
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.
answer
false
question
PPP can support several types of Network layer protocols that might use the connection.
answer
true
question
A community cloud is a service shared between multiple organizations, but not available publicly.
answer
true
question
A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.
answer
false
question
Office 365 is an example of an SaaS implementation with a subscription model.
answer
true
question
Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA).
answer
true
question
The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.
answer
false
question
FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.
answer
false
question
The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.
answer
true
question
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
answer
IaaS
question
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
answer
SaaS
question
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?
answer
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
question
The combination of a public key and a private key are known by what term below?
answer
key pair
question
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
answer
IPsec
question
At what layer of the OSI model does the IPsec encryption protocol operate?
answer
network layer
question
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
answer
VPN gateway
question
What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?
answer
Open VPN
question
Which statement regarding the use of a bridged mode vNIC is accurate?
answer
The vNIC will have its own IP address on the physical LAN.
question
When is it appropriate to utilize the NAT network connection type?
answer
Whenever the VM does not need to be accessed at a known address by other network nodes.
question
By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?
answer
NAT mode
question
Which statement regarding the IKEv2 tunneling protocol is accurate?
answer
IKEv2 offers fast throughput and good stability when moving between wireless hotspots.
question
The use of certificate authorities to associate public keys with certain users is known by what term?
answer
public-key infrastructure
question
A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?
answer
layer 2
question
Which of the following virtualization products is an example of a bare-metal hypervisor?
answer
Citrix XenServer
question
In a software defined network, what is responsible for controlling the flow of data?
answer
SDN controller
question
What term is used to describe a space that is rented at a data center facility by a service provider?
answer
point of presence (PoP)
question
Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?
answer
PPP can support strong encryption, such as AH or ESP.
question
Why is the telnet utility a poor choice for remote access to a device?
answer
It provides poor authentication and no encryption.
question
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
answer
SSH supports port forwarding.
question
Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?
answer
VNC is open source, allowing companies to develop their own software based on VNC.
question
Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
answer
Trivial FTP (TFTP)
question
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?
answer
Dynamic Multipoint VPN
question
Which of the following is NOT a task that a VPN concentrator is responsible for?
answer
A VPN concentrator shuts down established connections with malicious traffic occurs.
question
What is the default subnet mask for a Class B network?
answer
255.255.0.0
question
Which of the following could be the subnet mask of a subnetted Class B network? (Choose 2)
answer
255.255.240.0 255.255.255.0
question
How many subnets are created with when a Class B network is given a /24 prefix?
answer
256
question
What is the network ID of 150.100.100.100 /24?
answer
150.100.100.0
question
What is the first usable host on the network that includes the host 175.10.0.0 /16?
answer
175.10.1.0
question
What is the broadcast for subnet that 150.5.5.5 /24 is on?
answer
150.5.5.255