1/37
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Creative Co. needs a new private cloud setup. However, they want their field workers who operate remotely to have access to the private cloud's resources. Which of the following solutions may Creative Co. put into practice to enable users to establish secure connections from their PCs across the Internet into the private cloud?
VPN
A small business has made the decision to host its website in-house in its server room since they have the extra capacity. But periodically, for a few days at a time, their website becomes extremely popular, making it entirely inaccessible to all users. Which of the following could help them with their issue?
Cloud bursting
A tiny company decided to host its website internally in its server room because they have the extra space. However, their website occasionally experiences high popularity spikes that render it completely inaccessible to all users for a few days at a time. Which of the following might aid them in solving their problem?
Cloud bursting
Startup Widgets Inc. wants to control its own hardware and software. They do not have that much time set up in their timetable even though they are aware that finding land on which to build their own data center might take several months. Which of the following would enable them to create their own private cloud using their own hardware and have the option to move into their own data center if necessary?
colocation
Martin is running an analysis on the logs from one of the web servers that reside on the company's private cloud. He finds that some users are accessing a site they shouldn't be able to, as the firewall should have rules to prevent them from accessing the server. Which of the following might be how they were able to access the site?
The rules on the firewall were listed in an incorrect order.
Fictional Corp has just moved its web server from its on-premises data center to a cloud service provider. Which of the following most likely needs to be changed by an administrator?
DNS entries
Jadis has just created a new Linux server on the cloud service provider that her company uses. She attempts to SSH into it, and it immediately fails. Which of the following steps might she have forgotten to do?
Open port 22 on the virtual firewall
Jasper was given the IP address of 10.17.101.120/15 for the virtual machine he is to create along with the default gateway of 10.0.0.1. He enters the IP address correctly along with the subnet mask 255.254.0.0. However, the virtual machine doesn't appear to be able to communicate with the Internet when he tries to ping a popular domain name. Which of the following might be the reason why?
The default gateway is incorrect.
A network administrator is configuring a VPC in GCP, and manually enters the routes into a routing table. What kind of routing is this considered?
Static routing
Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?
vpn
Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer?
sticky session
Tim has three separate VPCs at the cloud service provider that his company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might he implement in order to accommodate that requirement?
Cloud peering
Frederica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?
vlan
Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?
vxlan
Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?
DNS servers
Jenna's cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company's website?
AAAA
Jordan's manager knows that he is working on implementing a VPN connection between the company's on-premises data center and the cloud service provider his company uses. The manager was concerned that Jordan used an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following protocols was manager was concerned about?
PPTP
Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?
L2TP
Marissa is wanting to implement a VPN at her company but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?
OpenVPN
Jens was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following was Jens reading about?
IPsec
Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?
OpenVPN
LeRoy has decided that the servers in one of the VPCs that he manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should he disable on the firewall for that VPC?
53
Reggie is troubleshooting an issue related to an incorrectly configured load balancer. He thinks he made a mistake when he was setting up the ports but isn't quite sure if that's the root cause of the issues. Interference or errors in which of the following areas will confirm Reggie's suspicions?
Health-check protocol
Davis has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated, and he needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique he is looking to implement?
Cloud bursting
Jaysen is trying to determine whether one of the new servers he set up on the cloud service provider is reachable and online from his current workstation. Which of the following tools is he most likely trying to use?
ping
Denis is trying to determine which route's packets are traveling over when accessing his company's chosen cloud service provider. Which of the following Windows tools can help him discover that information?
tracert
Xena has noticed that traffic to her company's website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this?
GSLB
Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information?
arp
Geoff is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. He wants to see what the current dynamic IP address is. Which of the following command line utilities can he use to view that information?
ipconfig
Adrienne wants to be able to analyze the traffic coming into a Linux server's network interface. Which of the following command line utilities will allow her to see this information?
tcpdump
Justin wants to look at the current IP configuration on a Linux server. Which of the following tools can he use to view this information? (Choose two)
-ifconfig-ip
Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be?
nslookup
Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use?
netstat
Vahé is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can he use to find that information?
traceroute
A year ago, Raj configured two servers on separate VLANs. He still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for him to do?
Create a route between the two VLANs, so they know how to contact each other.
Emily has just migrated the email from the company's on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn't being delivered to the new servers. Which of the following records does she still need to modify?
MX
Laurel is selecting a VPN protocol for her company's network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?
IKEv2
Colm is designating the QoS level to the messages on his corporation's network and has determined a certain type of message should be delivered exactly once when it is sent. Which QoS level should he designate these messages?
QoS 2