**MIS 341 Quiz 5** OMG WHEN WILL THE HORRORS END

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Creative Co. needs a new private cloud setup. However, they want their field workers who operate remotely to have access to the private cloud's resources. Which of the following solutions may Creative Co. put into practice to enable users to establish secure connections from their PCs across the Internet into the private cloud?

VPN

2
New cards

A small business has made the decision to host its website in-house in its server room since they have the extra capacity. But periodically, for a few days at a time, their website becomes extremely popular, making it entirely inaccessible to all users. Which of the following could help them with their issue?

Cloud bursting

3
New cards

A tiny company decided to host its website internally in its server room because they have the extra space. However, their website occasionally experiences high popularity spikes that render it completely inaccessible to all users for a few days at a time. Which of the following might aid them in solving their problem?

Cloud bursting

4
New cards

Startup Widgets Inc. wants to control its own hardware and software. They do not have that much time set up in their timetable even though they are aware that finding land on which to build their own data center might take several months. Which of the following would enable them to create their own private cloud using their own hardware and have the option to move into their own data center if necessary?

colocation

5
New cards

Martin is running an analysis on the logs from one of the web servers that reside on the company's private cloud. He finds that some users are accessing a site they shouldn't be able to, as the firewall should have rules to prevent them from accessing the server. Which of the following might be how they were able to access the site?

The rules on the firewall were listed in an incorrect order.

6
New cards

Fictional Corp has just moved its web server from its on-premises data center to a cloud service provider. Which of the following most likely needs to be changed by an administrator?

DNS entries

7
New cards

Jadis has just created a new Linux server on the cloud service provider that her company uses. She attempts to SSH into it, and it immediately fails. Which of the following steps might she have forgotten to do?

Open port 22 on the virtual firewall

8
New cards

Jasper was given the IP address of 10.17.101.120/15 for the virtual machine he is to create along with the default gateway of 10.0.0.1. He enters the IP address correctly along with the subnet mask 255.254.0.0. However, the virtual machine doesn't appear to be able to communicate with the Internet when he tries to ping a popular domain name. Which of the following might be the reason why?

The default gateway is incorrect.

9
New cards

A network administrator is configuring a VPC in GCP, and manually enters the routes into a routing table. What kind of routing is this considered?

Static routing

10
New cards

Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?

vpn

11
New cards

Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer?

sticky session

12
New cards

Tim has three separate VPCs at the cloud service provider that his company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might he implement in order to accommodate that requirement?

Cloud peering

13
New cards

Frederica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?

vlan

14
New cards

Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?

vxlan

15
New cards

Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?

DNS servers

16
New cards

Jenna's cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company's website?

AAAA

17
New cards

Jordan's manager knows that he is working on implementing a VPN connection between the company's on-premises data center and the cloud service provider his company uses. The manager was concerned that Jordan used an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following protocols was manager was concerned about?

PPTP

18
New cards

Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?

L2TP

19
New cards

Marissa is wanting to implement a VPN at her company but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?

OpenVPN

20
New cards

Jens was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following was Jens reading about?

IPsec

21
New cards

Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?

OpenVPN

22
New cards

LeRoy has decided that the servers in one of the VPCs that he manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should he disable on the firewall for that VPC?

53

23
New cards

Reggie is troubleshooting an issue related to an incorrectly configured load balancer. He thinks he made a mistake when he was setting up the ports but isn't quite sure if that's the root cause of the issues. Interference or errors in which of the following areas will confirm Reggie's suspicions?

Health-check protocol

24
New cards

Davis has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated, and he needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique he is looking to implement?

Cloud bursting

25
New cards

Jaysen is trying to determine whether one of the new servers he set up on the cloud service provider is reachable and online from his current workstation. Which of the following tools is he most likely trying to use?

ping

26
New cards

Denis is trying to determine which route's packets are traveling over when accessing his company's chosen cloud service provider. Which of the following Windows tools can help him discover that information?

tracert

27
New cards

Xena has noticed that traffic to her company's website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this?

GSLB

28
New cards

Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information?

arp

29
New cards

Geoff is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. He wants to see what the current dynamic IP address is. Which of the following command line utilities can he use to view that information?

ipconfig

30
New cards

Adrienne wants to be able to analyze the traffic coming into a Linux server's network interface. Which of the following command line utilities will allow her to see this information?

tcpdump

31
New cards

Justin wants to look at the current IP configuration on a Linux server. Which of the following tools can he use to view this information? (Choose two)

-ifconfig-ip

32
New cards

Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be?

nslookup

33
New cards

Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use?

netstat

34
New cards

Vahé is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can he use to find that information?

traceroute

35
New cards

A year ago, Raj configured two servers on separate VLANs. He still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for him to do?

Create a route between the two VLANs, so they know how to contact each other.

36
New cards

Emily has just migrated the email from the company's on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn't being delivered to the new servers. Which of the following records does she still need to modify?

MX

37
New cards

Laurel is selecting a VPN protocol for her company's network. This network includes a large number of users that move between wireless hotspots in the course of their jobs. User privacy is also required when using the VPN. Which protocol should Laurel consider using?

IKEv2

38
New cards

Colm is designating the QoS level to the messages on his corporation's network and has determined a certain type of message should be delivered exactly once when it is sent. Which QoS level should he designate these messages?

QoS 2