Resources is optional at time of vm creation

Assignment Help Basic Computer Science
Reference no: EM133234766

1. Which of the following resources is optional at the time of VM creation?

a. public ip address

b. virtual network

c. network interface

d. resource group

2. Network Security group rules are evaluated in order of__________

a. priority

b. name (alphabetical)

c. direction

d. port number

3. Which of the following properties may change depending on the size of the VM?

a. all of these

b. max number of disks

c. memory

d. vCPUs

4. Which of the following qualifies as a destination for inbound NSG rules?

a. NIC

b. virtual network

c. resource group

d. virtual machine

5. Which of the following would qualify as a point-to-site VPN connection?

a. local machine to VPN gateway

b. vm to vm within the same virtual network

c. vm to vm within the different virtual network

d. vm to mySql deployment within the same virtual network

6. Which of the following is not a property of an incoming load balancer request?

a. source ip

b. protocol

c. destination port

d. name of virtual network

Reference no: EM133234766

Questions Cloud

How do you think living in digital world : How do you think living in the "Digital World" of 2022 has changed things for us during COVID-19, both for better and possibly for worse?
Describe task of accessing random website homepage : Use the GOMS model to describe the task of accessing a random website's homepage with two different methods,
Company publications : Why is it important to have a consistent logo picture throughout all of a company's publications, including its website?
Each coin can cover single square on board : Each coin can cover a single square on the board. You want to place all of the coins on the board so that no more than 2 coins appear on any row
Resources is optional at time of vm creation : Which of the following resources is optional at the time of VM creation? Which of the following qualifies as a destination for inbound NSG rules?
Push and pop methods on stack : Java program that can unand redo the push and pop methods on a stack.
About the internal mechanics of machine : I believe that this answer depends upon how many people's lives would be affected if there was some sort of malfunction with the machine
What are the functions of utility room : What are the three main areas of a home? What are the functions of a utility room? What are the service areas of the home? Describe the use of a foyer in a home
Applying two different simple substitutions to plaintext : Let S(x) and T(x) be the cipher texts obtained by applying two different simple substitutions to the plaintext x.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Summarize a peer-reviewed journal article

Search the health care literature and summarize a peer-reviewed journal article published within the last five years.

  Characteristics of buyers of hybrid honda civic ima

The accompanying data are from the article "Characteristics of Buyers of Hybrid Honda Civic IMA: Preferences, Decision Process

  Federal government role in public health

Write an analysis of the federal government's role in public health and discuss the cost of implementing a program of your choosing

  Why is diminishing returns a short-run issue

Why is diminishing returns a short-run issue? Can it be wise to produce more units despite experiencing diminishing marginal returns?

  What is the coefficient of variation

Given the following three months of data what is the coefficient of variation?

  Electricians to redo the plumbing and wiring

How many different ways can we choose 2 plumbers and 3 electricians out of 4 plumbers and 5 electricians to redo the plumbing and wiring in an old warehouse?

  Appropriate disciplinary action for the employees

Determine and explain the appropriate disciplinary action for the employees involved in this situation and identify motivational alternatives that can help turn the situation around;

  What is cyberloafing

How is an employee differentiated from a contracter under US law? What is cyberloafing? Does the gig economy appeal to you? Why or why not?

  What style of interview your target employer typically uses

How will you benefit from knowing what style of interview your target employer typically uses?

  One-way permutation is a trapdoor function

Is it true that every one-way permutation is a trapdoor function? That every trapdoor function is a one-way permutation? Explain.

  Identify law-regulation that you are proposing to address

Identify law-regulation that you are proposing to address.Then draft proposed topic for research paper regarding influence on information security governance.

  Threat information whether physical or technological

You are to look at datasets that relate to threat information whether physical or technological.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd