Shorthand method for identifying network

Assignment Help Basic Computer Science
Reference no: EM133218159

Part 1: Multiple Choice

1. In the cloud, how are private IP addresses assigned?

Chronologically from specific IP address ranges defined when the virtual network and its subnets are created.

Chronologically from a local DHCP server defined when the virtual network and its subnets are created.

Dynamically from a local DHCP server defined when the virtual network and its subnets are created.

Randomly from the reserved set of private IP address assigned to a virtual machine when it is brought online.

2. Which term refers to a shorthand method for identifying network and host bits in an IP address?

Encapsulation

Peering

Subnetting

Classless interdomain routing (CIDR) notation

3. Which term refers to a geographic location of a CSP's physical data center?

Virtual private cloud (VPC)

Region

Software-defined data center (SDDC)

Availability zone (AZ)

4. Which term refers to an organization's network that spans two or more cloud platforms, such as AWS and GCP, or Azure and Salesforce?

Hybrid cloud

Multi-cloud

Border gateway

Virtual private cloud (VPC)

5. Which term refers to a virtual connection between two geographically distant locations that provides access to network resources between a client and a remote network, two remote networks, or two remote hosts over the Internet?

Multi-site load balancing

Peering

VPN

Tunneling

6. Which tool is used to configure DHCP across a hybrid cloud so that one system manages DHCP services both on-prem and in the cloud?

BGP

IPAM

Multi-site load balancing

DNS

7. Which term refers to a hierarchical approach to tracking domain names and their addresses?

DNS

DHCP

Name resolution

Load balancing

8. Which command can be used to identify bottlenecks causing latency issues when hosting resources in the cloud?

netstat

ipconfig

tracert

arp

9. Which term refers to a security technique that allows for granular control of traffic and workflows within a cloud-based network?

Tunneling

Firewalling

Micro segmentation

Defense-in-depth (DiD)

10. What term refers to an area on the perimeter of a network that is less protected than the internal network and provides internal resources with a transitive connection to external resources?

Network Virtual Appliance (NVA)

Demilitarized zone (DMZ)

Intrusion prevention system (IPS)

Network Security Group (NSG)

11. Segmentation of GCP resources is first achieved at the __________ level.

project

subnet

application

instance

12. Which benchmark ensures that a data block was not modified after the sender transmitted it and before the receiver picked it up?

Integrity

Confidentiality

Availability

Auditability

13. Which term refers to a series of characters that is combined with a block of data during that block of data's encryption?

Blockchain

Code

Cipher

Key

14. Which term refers to the master user in a cloud account or compute system that retains complete access and action permissions, no matter what permissions are also given to other users?

Supervisor

Root

Lead

Principle

15. What term refers to the extent of system vulnerability to a destructive event such as a security breach or device failure?

DMZ

Blast radius

Deduplication

Federation

Part 2. short answers

The following questions are related to lectures 4-7 on Moodle. Please give short answer to the following questions:

1. True or False: Azure chooses the route to apply to traffic by how closely the destination IP address matches a route's address prefix.

2. True or False: Cloud consumers have control over physical security or configuration of the physical infrastructure supporting their cloud-hosted data.

3. True or False: Subnetting helps manage IP address spaces in the cloud and it is imperative to understand this concept.

4. True or False: VPNs are an expensive and relatively secure mode of connection to cloud resources.

5. True or False: An administrator can change some of the DHCP options that a VM instance receives when its interface is created

6. What kinds of threats do cloud users face?

7. Explain cloud-centric security techniques.

8. Why shadow IT can be beneficial.

9. What are 4 account management policies' benefits.

10. True or False: When creating cloud accounts, it is important to avoid using the default root account. Instead, for security purposes, users should be assigned less-privileged user accounts with which to access and interact with cloud resources.

Reference no: EM133218159

Questions Cloud

Specific modality of crime : Write paper that addresses cybercrime law in a particular area. You may choose the specific modality of crime.
T-shirts was designed using modular approach : An online store selling T-shirts was designed using a modular approach. Should a user wish to make a purchase, they have to login.
Dsppfm display physical file member command : Create Physical File CARMAS using STRPDM and member in your QDDSSRC source file. DSPPFM Display Physical File Member Command.
Describe how electronic system : Describe how an electronic system may be used to count the number of people entering a building.
Shorthand method for identifying network : Which term refers to a shorthand method for identifying network and host bits in an IP address?
Benefits of Wi-Fi vs cellular wireless technologies : Compare the uses, speeds, and benefits of Wi-Fi vs cellular wireless technologies in a business environment.
Apply pattern recognition : Describe, in detail, at least two major logical parts of this problem where you would have to apply pattern recognition (not data representation).
Describes the pipeline jungles anti-pattern : What best describes the pipeline jungles anti-pattern?
About the problem with fake news : In this module you read about the problem with fake news. Do you agree that this is a serious concern? Why or why not?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd