Net+ Practice Test 3

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Which of the following terms can be used to describe an isolated network area hosted within a public cloud environment?

VPC

2
New cards

Which of the answers listed below can be used to describe the concept of a Network Security Group (NSG)?

Applies security rules to specific virtual NICs (more granular control), Used for controlling inbound and outbound traffic in cloud computing environments, Provides firewall-like capabilities

3
New cards

Which of the following answers refer to the characteristics of a Network Security List (NSL)?

Applies security rules at the subnet level (less granular control), Used for controlling inbound and outbound traffic in cloud computing environments, Provides firewall-like capabilities

4
New cards

A type of network gateway that allows instances within a cloud environment to send and receive unencrypted traffic to and from the Internet is called:

Internet gateway

5
New cards

Which of the statements listed below describe the functions of a cloud gateway using NAT?

Enables instances within a VPC to access external networks, Translates private IP addresses to a public IP address, Restricts inbound connections from external networks

6
New cards

Which network connectivity option enables a secure, encrypted Internet connection between an on-premises network and cloud resources?

VPN

7
New cards

Which cloud connectivity option provides a dedicated, private connection between an on-premises network and a cloud provider?

Direct Connect

8
New cards

Which of the following answers refers to a cloud deployment model where computing resources (such as servers, storage, and applications) are owned and operated by a third-party cloud service provider and shared across multiple organizations or tenants?

Public cloud

9
New cards

A type of cloud deployment model where cloud resources are used exclusively by a single organization is referred to as:

Private cloud

10
New cards

A hybrid cloud is a cloud computing environment that combines elements of both public and private clouds.

True

11
New cards

A cloud computing service model that provides remote access to software applications based on a subscription fee is known as:

SaaS

12
New cards

Which of the answers listed below refers to a cloud computing service model where clients, instead of buying hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

IaaS

13
New cards

Which cloud computing service model would provide the best solution for a web developer intending to create a web app?

PaaS

14
New cards

Which of the following terms refers to the ability of a system to handle increased load by gradually adding resources, such as additional servers or storage, in a planned and deliberate manner over time?

Scalability

15
New cards

Which of the terms listed below refers to the automatic and dynamic adjustment of resources based on real-time demand changes?

Rapid elasticity

16
New cards

Which of the following terms refers to a software architecture where multiple users, each with their own isolated environment and resources, are served by a single application instance?

Multitenancy

17
New cards

What is the function of FTP?

File exchange

18
New cards

Which of the answers listed below refers to a network protocol for secure file transfer over SSH?

SFTP

19
New cards

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:

SSH

20
New cards

Telnet:

Provides username & password authentication, Transmits data in an unencrypted form, Enables remote login and command execution

21
New cards

Which of the following answers refers to a secure replacement for Telnet?

SSH

22
New cards

The SMTP protocol is used for:

Sending email messages between mail servers, Sending email messages from a client device

23
New cards

Which of the answers listed below refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

DNS

24
New cards

Which of the following network protocols provides an alternative solution to the manual allocation of IP addresses?

DHCP

25
New cards

What are the characteristic features of TFTP?

Provides no security features, very basic form of file sharing protocol