Module 4 Quizlet Entries (Exact Extraction)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:20 PM on 3/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

32 Terms

1
New cards

Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life, and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company?

VPC

2
New cards

Simon was asked to create three Linux virtual machines to host the company's new sales application and database server. He is going to be using the company's cloud service provider and was given the 10.20.30.0/30 subnet to put them on. He immediately tells the person giving him this task that he cannot do what is asked of him. Why?

The /30 subnet is not large enough for 3 virtual machines

3
New cards

Thelonius has just created a new virtual machine. By default, the cloud service provider automatically configured it as part of a class C private network. Which of the following is the default subnet mask expressed in CIDR notation that was configured?

/24

4
New cards

Maggie wants to create a small subnetwork for the Human Resources servers that her organization uses. There are currently 10 servers, but she also needs to plan for 50 percent growth over the next two years. Which of the following subnet masks would give her adequate IP address space while leaving the fewest number of unused IP addresses in the block?

255.255.255.240

5
New cards

Beth has been asked to migrate the company's virtual private clouds from class C private addresses to class B private addresses. Which of the following is a valid address for her to change the web server's IP address to?

172.30.101.50

6
New cards

Clarke is trying to come up with a subnet mask so that three servers with the IP addresses 172.16.31.10, 172.16.30.15, and 172.16.31.206 are in the same network. Which of the following subnet masks will accommodate this requirement?

255.255.254.0

7
New cards

Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement?

different subnets for each department

8
New cards

Morgan has hardened the virtual machines in the subnet he's just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment?

virtual firewall

9
New cards

Carl has created a virtual machine on the cloud service provider that his company uses and has given it a static private IP address. He wants to make this server is the new web server for the company's website. Which of the following is required to allow that server to perform in that role?

IG

10
New cards

In order for a server that has a private IP address to be accessible by the public Internet, it must go through an

Internet gateway

11
New cards

The range of class B private IP addresses is

172.16.0.0 through 172.31.255.255

12
New cards

A /28 mask will create subnets with ______ IP addresses per block.

16

13
New cards

Tim has three separate VPCs at the cloud service provider that his company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might he implement in order to accommodate that requirement?

cloud peering

14
New cards

Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?

VXLAN

15
New cards

Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?

VPN

16
New cards

Darnell does not want to manually assign IP addresses to clients on one of the network segments that he manages. Instead, he wants clients to obtain an IP address from a server that manages a pool of IP addresses. Which of the following technologies should he implement?

DHCP

17
New cards

The DHCP (Dynamic Host Configuration Protocol) is used to

dynamically assign IP addresses to clients on a network.

18
New cards

Cara works for a startup company that up until now has been running on a single virtual machine. The virtual machine is starting to see capacity issues and she is unable to provision more CPU and memory resources to satisfy its needs. Which of the following would allow her to expand the capacity of her company's web server?

load balancer

19
New cards

Frederica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?

VLAN

20
New cards

In a cloud environment, which device might be arranged at the presentation tier of a basic three-tier infrastructure?

a user's smartphone

21
New cards

Abby has just created a new virtual machine. Once it has been installed, she connects to it and finds that it has configured the default subnet mask for a class A network. Which of the following subnet masks was automatically configured for this server?

255.0.0.0

22
New cards

Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?

OpenVPN

23
New cards

Jens was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following was Jens reading about?

IPsec

24
New cards

Bellamy has been asked to configure the virtual router interface for the subnetwork that contains the server with IP address 172.19.101.200 and subnet mask of 255.255.255.128. He is asked to use the first usable IP address of the subnet. Which of the following IP addresses should he use?

172.19.101.129

25
New cards

Hershel is working with a virtual network that has the subnet mask 255.255.255.192. He changes the IP address of one of the servers from 172.16.25.183 to 172.16.25.193. What is the result of this change?

The server will no longer be able to communicate with the devices on the subnetwork that it was previously in without the aid of a router.

26
New cards

Octavia has set up a private cloud with a virtual machine at the IP address 172.19.101.5 and the subnet mask 255.255.255.192. She has been asked what the broadcast IP address is for the network. How should she respond?

172.19.101.63

27
New cards

Carol has created a subnet of 10.20.30.0/27. Which of the following is the address that is used for broadcast messages within the subnet?

10.20.30.31

28
New cards

Darryl has been given the 10.20.30.64/26 network to use for a set of virtual machines that he is provisioning on his company's private cloud. He has been told to configure the last usable IP address in the range as the gateway, or router, address. Which of the following IP addresses should he use for the gateway?

10.20.30.126

29
New cards

What is one difference in the virtual private clouds (VPCs) created by GCP and those created by other cloud providers?

GCP VCPs are global by default

30
New cards

 Lexa has been asked for the subnet ID and subnet mask in CIDR notation for one of the web servers in the company's private cloud. The web server has an IP address of 192.168.1.200 and a subnet mask of 255.255.255.192. What should she tell them?

192.168.1.192/26

31
New cards

Eugene has been given the subnet 10.20.30.0/24 to use for the creation of a group of virtual machines to be used for the sales department. He is used to seeing a subnet mask in the format of four numbers separated by periods (255.255.255.0) along with the subnet ID, but isn't familiar with what the slash and a number mean after the subnet ID. He asks you to help him interpret the information. What term should you tell him to search for on a search engine to learn more about this topic?

CIDR

32
New cards

Rick is planning a deployment of multiple virtual machines that need to have internal IP addresses. He is unsure which address ranges he can use. He knows there is a formal document that outlines the ranges that can be used for internal addresses. Which of the following options is that formalized set of specifications?

RFC 1918

Explore top notes

note
Quadratic sequences
Updated 1158d ago
0.0(0)
note
AP Bio: Unit 2 Chemistry of Life
Updated 690d ago
0.0(0)
note
Chemistry Honors: Final Review
Updated 299d ago
0.0(0)
note
War of the worlds plot summary
Updated 33d ago
0.0(0)
note
French Unit 3 Study Guide
Updated 1236d ago
0.0(0)
note
Hormones and behavior
Updated 1355d ago
0.0(0)
note
Electricity
Updated 1232d ago
0.0(0)
note
Quadratic sequences
Updated 1158d ago
0.0(0)
note
AP Bio: Unit 2 Chemistry of Life
Updated 690d ago
0.0(0)
note
Chemistry Honors: Final Review
Updated 299d ago
0.0(0)
note
War of the worlds plot summary
Updated 33d ago
0.0(0)
note
French Unit 3 Study Guide
Updated 1236d ago
0.0(0)
note
Hormones and behavior
Updated 1355d ago
0.0(0)
note
Electricity
Updated 1232d ago
0.0(0)