1/24
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following terms can be used to describe an isolated network area hosted within a public cloud environment?
VPC
Which of the answers listed below can be used to describe the concept of a Network Security Group (NSG)?
Applies security rules to specific virtual NICs (more granular control), Used for controlling inbound and outbound traffic in cloud computing environments, Provides firewall-like capabilities
Which of the following answers refer to the characteristics of a Network Security List (NSL)?
Applies security rules at the subnet level (less granular control), Used for controlling inbound and outbound traffic in cloud computing environments, Provides firewall-like capabilities
A type of network gateway that allows instances within a cloud environment to send and receive unencrypted traffic to and from the Internet is called:
Internet gateway
Which of the statements listed below describe the functions of a cloud gateway using NAT?
Enables instances within a VPC to access external networks, Translates private IP addresses to a public IP address, Restricts inbound connections from external networks
Which network connectivity option enables a secure, encrypted Internet connection between an on-premises network and cloud resources?
VPN
Which cloud connectivity option provides a dedicated, private connection between an on-premises network and a cloud provider?
Direct Connect
Which of the following answers refers to a cloud deployment model where computing resources (such as servers, storage, and applications) are owned and operated by a third-party cloud service provider and shared across multiple organizations or tenants?
Public cloud
A type of cloud deployment model where cloud resources are used exclusively by a single organization is referred to as:
Private cloud
A hybrid cloud is a cloud computing environment that combines elements of both public and private clouds.
True
A cloud computing service model that provides remote access to software applications based on a subscription fee is known as:
SaaS
Which of the answers listed below refers to a cloud computing service model where clients, instead of buying hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
IaaS
Which cloud computing service model would provide the best solution for a web developer intending to create a web app?
PaaS
Which of the following terms refers to the ability of a system to handle increased load by gradually adding resources, such as additional servers or storage, in a planned and deliberate manner over time?
Scalability
Which of the terms listed below refers to the automatic and dynamic adjustment of resources based on real-time demand changes?
Rapid elasticity
Which of the following terms refers to a software architecture where multiple users, each with their own isolated environment and resources, are served by a single application instance?
Multitenancy
What is the function of FTP?
File exchange
Which of the answers listed below refers to a network protocol for secure file transfer over SSH?
SFTP
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:
SSH
Telnet:
Provides username & password authentication, Transmits data in an unencrypted form, Enables remote login and command execution
Which of the following answers refers to a secure replacement for Telnet?
SSH
The SMTP protocol is used for:
Sending email messages between mail servers, Sending email messages from a client device
Which of the answers listed below refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
DNS
Which of the following network protocols provides an alternative solution to the manual allocation of IP addresses?
DHCP
What are the characteristic features of TFTP?
Provides no security features, very basic form of file sharing protocol