Shorthand method for identifying network

Assignment Help Basic Computer Science
Reference no: EM133218159

Part 1: Multiple Choice

1. In the cloud, how are private IP addresses assigned?

Chronologically from specific IP address ranges defined when the virtual network and its subnets are created.

Chronologically from a local DHCP server defined when the virtual network and its subnets are created.

Dynamically from a local DHCP server defined when the virtual network and its subnets are created.

Randomly from the reserved set of private IP address assigned to a virtual machine when it is brought online.

2. Which term refers to a shorthand method for identifying network and host bits in an IP address?

Encapsulation

Peering

Subnetting

Classless interdomain routing (CIDR) notation

3. Which term refers to a geographic location of a CSP's physical data center?

Virtual private cloud (VPC)

Region

Software-defined data center (SDDC)

Availability zone (AZ)

4. Which term refers to an organization's network that spans two or more cloud platforms, such as AWS and GCP, or Azure and Salesforce?

Hybrid cloud

Multi-cloud

Border gateway

Virtual private cloud (VPC)

5. Which term refers to a virtual connection between two geographically distant locations that provides access to network resources between a client and a remote network, two remote networks, or two remote hosts over the Internet?

Multi-site load balancing

Peering

VPN

Tunneling

6. Which tool is used to configure DHCP across a hybrid cloud so that one system manages DHCP services both on-prem and in the cloud?

BGP

IPAM

Multi-site load balancing

DNS

7. Which term refers to a hierarchical approach to tracking domain names and their addresses?

DNS

DHCP

Name resolution

Load balancing

8. Which command can be used to identify bottlenecks causing latency issues when hosting resources in the cloud?

netstat

ipconfig

tracert

arp

9. Which term refers to a security technique that allows for granular control of traffic and workflows within a cloud-based network?

Tunneling

Firewalling

Micro segmentation

Defense-in-depth (DiD)

10. What term refers to an area on the perimeter of a network that is less protected than the internal network and provides internal resources with a transitive connection to external resources?

Network Virtual Appliance (NVA)

Demilitarized zone (DMZ)

Intrusion prevention system (IPS)

Network Security Group (NSG)

11. Segmentation of GCP resources is first achieved at the __________ level.

project

subnet

application

instance

12. Which benchmark ensures that a data block was not modified after the sender transmitted it and before the receiver picked it up?

Integrity

Confidentiality

Availability

Auditability

13. Which term refers to a series of characters that is combined with a block of data during that block of data's encryption?

Blockchain

Code

Cipher

Key

14. Which term refers to the master user in a cloud account or compute system that retains complete access and action permissions, no matter what permissions are also given to other users?

Supervisor

Root

Lead

Principle

15. What term refers to the extent of system vulnerability to a destructive event such as a security breach or device failure?

DMZ

Blast radius

Deduplication

Federation

Part 2. short answers

The following questions are related to lectures 4-7 on Moodle. Please give short answer to the following questions:

1. True or False: Azure chooses the route to apply to traffic by how closely the destination IP address matches a route's address prefix.

2. True or False: Cloud consumers have control over physical security or configuration of the physical infrastructure supporting their cloud-hosted data.

3. True or False: Subnetting helps manage IP address spaces in the cloud and it is imperative to understand this concept.

4. True or False: VPNs are an expensive and relatively secure mode of connection to cloud resources.

5. True or False: An administrator can change some of the DHCP options that a VM instance receives when its interface is created

6. What kinds of threats do cloud users face?

7. Explain cloud-centric security techniques.

8. Why shadow IT can be beneficial.

9. What are 4 account management policies' benefits.

10. True or False: When creating cloud accounts, it is important to avoid using the default root account. Instead, for security purposes, users should be assigned less-privileged user accounts with which to access and interact with cloud resources.

Reference no: EM133218159

Questions Cloud

Specific modality of crime : Write paper that addresses cybercrime law in a particular area. You may choose the specific modality of crime.
T-shirts was designed using modular approach : An online store selling T-shirts was designed using a modular approach. Should a user wish to make a purchase, they have to login.
Dsppfm display physical file member command : Create Physical File CARMAS using STRPDM and member in your QDDSSRC source file. DSPPFM Display Physical File Member Command.
Describe how electronic system : Describe how an electronic system may be used to count the number of people entering a building.
Shorthand method for identifying network : Which term refers to a shorthand method for identifying network and host bits in an IP address?
Benefits of Wi-Fi vs cellular wireless technologies : Compare the uses, speeds, and benefits of Wi-Fi vs cellular wireless technologies in a business environment.
Apply pattern recognition : Describe, in detail, at least two major logical parts of this problem where you would have to apply pattern recognition (not data representation).
Describes the pipeline jungles anti-pattern : What best describes the pipeline jungles anti-pattern?
About the problem with fake news : In this module you read about the problem with fake news. Do you agree that this is a serious concern? Why or why not?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Planning step of software development life cycle

Discuss the roles and responsibilities of senior management in program and project planning step of software development life cycle.

  Interesting concept about wireless signals

Find a video that shows an interesting concept about wireless signals, provide a summary of the video, and attach it to your discussion. As an investigator, how would you identify wireless signals? How would you know what to look for?

  Describe the results of lessons learned analysis

Describe the results of Lessons Learned analysis and the implications for the remaining phases of this project as well as scheduling phase for future projects

  The significance of equipment and system

You are the new Compliance and Accountability Manager for the mid-size company. During the first two weeks on the job, you have conducted several inspections on

  Understanding of laws-regulations related to privacy issues

Course Paper is to evince your understanding of the laws and regulations related to privacy issues and challenges found in information technology settings.

  Describe the difference between configuration scan

Briefly describe the difference between a configuration scan and a vulnerability scan. Identify two applications that are available to perform these scans.

  Corporate social responsibility or ethical culture

Pick one of the following terms for your research: Morals, principles, values, corporate social responsibility, or ethical culture.

  Determiningt the it systems architecture

You are a senior-level employee and you must tailor your deliverables to suit your audience: the leadership of the organization. You may choose to use a fictitious organization, or model your organization on an existing organization, including pro..

  Three main areas of relevance to the governance

Berg outlines three main areas of relevance to the governance of the City's political system: democratic accountability

  About how human nutrition has changed over time

Digestive disorders are nothing new. Now think about how human nutrition has changed over time and across geographical locations.

  According to the national climatic data center

According to the National Climatic Data Center, during 1991, the lowest temperature recorded in Indianapolis, Indiana, was 0°F. If x is the wind speed

  Time value of money question

Time value of money question. If you can please show step by step.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd