Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Module 13-14

QuestionAnswer
A company uses a cloud-based payroll system. Which cloud computing technology is this company using? software as a service (SaaS)
2. For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model? There are significant data exchanges between virtual servers.
3. Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network? control plane
4. Which network traffic management technology is a basic element in SDN implementations? OpenFlow
5. Which type of hypervisor would most likely be used in a data center? Type 1
6. Which is a characteristic of a Type 1 hypervisor?​ installed directly on a server
7. Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​ Layer 2 Layer 3
8. What pre-populates the FIB on Cisco devices that use CEF to process packets? the routing table
9. What is a function of the data plane of a network device? forwarding traffic flows
10. Which statement describes the concept of cloud computing? separation of application from hardware
11. Which cloud model provides services for a specific organization or entity? private cloud
12. What two benefits are gained when an organization adopts cloud computing and virtualization? (Choose two.) provides a “pay-as-you-go” model, allowing organizations to treat computing and storage expenses as a utility enables rapid responses to increasing data volume requirements
13. Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance? type 2
14. A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.) The company only needs to pay for the amount The company does not need to be concerned about how to handle increasing data storage and processing demands The company can increase processing and storage capacity as needed then decrease capacity
15. How does virtualization help with disaster recovery within a data center? support of live migration
16. What technology allows users to access data anywhere and at any time? Cloud computing
17. Which action takes place in the assurance element of the IBN model? verification and corrective action
18. Refer to the exhibit. Which data format is used to represent the data for network automation applications? JSON
19. What is the function of the key contained in most RESTful APIs? It is used to authenticate the requesting source.
20. Which two configuration management tools are developed using Ruby? (Choose two.) Puppet and Chef
21. Which term is used to describe a set of instructions for execution by the configuration management tool Puppet? Manifest
22. Which term is used to describe a set of instructions for execution by the configuration management tool SaltStack? Pillar
23. Which scenario describes the use of a public API? It can be used with no restrictions.
24. What is YAML? It is a data format and superset of JSON.
25. Which RESTFul operation corresponds to the HTTP GET method? read
26. Which technology virtualizes the network control plane and moves it to a centralized controller?​ SDN
27. What are two functions of hypervisors? (Choose two.) to manage virtual machines to allocate physical system resources to virtual machines
28. What is a difference between the functions of Cloud computing and virtualization? Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.
29. How is the YAML data format structure different from JSON? It uses indentations.
30. What is the most widely used API for web services? REST
31. What is REST? It is an architecture style for designing web service applications.
32. What is a difference between the XML and HTML data formats? XML does not use predefined tags whereas HTML does use predefined tags.
To avoid purchasing hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for operating systems on a hardware platform. What service or technology would support this requirement? virtualization
35. Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company? infrastructure as a service (IaaS)
36. What component is considered the brains of the ACI architecture and translates application policies​? the Application Policy Infrastructure Controller
37. Which statement describes the concept of cloud computing? separation of application from hardware
38. In which situation would a partner API be appropriate? a vacation service site interacting with hotel databases to display information from all the hotels on its web site
39. Because of enormous growth in web traffic, a company has planned to purchase additional servers to help handle the web traffic. What service or technology would support this requirement? dedicated servers
40. ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement? virtualization
41. What are three components used in the query portion of a typical RESTful API request? (Choose three.) format, parameters, key
42. A company has recently become multinational. Employees are working remotely, in different time zones, and they need access to company services from any place at any time. What service or technology would support this requirement? cloud services
After an advertising campaign for a new product, a company finds its client database and volume of orders overloading its on-site computer systems but the company does not have room to expand. What service or technology would support this requirement? cloud services
44. A network administrator is tasked with creating a disaster recovery plan. As part of this plan, the administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement? data center
45. Which is a requirement of a site-to-site VPN? It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
46. Which statement describes an important characteristic of a site-to-site VPN? It must be statically set up.
47. Which protocol is attacked when a cybercriminal provides an invalid gateway in order to create a man-in-the-middle attack? DHCP
48. In which TCP attack is the cybercriminal attempting to overwhelm a target host with half-open TCP connections? SYN flood attack
49. Which statement describes a VPN? VPNs use virtual connections to create a private network through a public network.
(1) resources (2)parameters (3) query (4)API servers (5)format (6) key (1) directions (2) from=San+Jose (3) outFormat=json&key (4) key=key
Created by: user-1838864
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards