
Lesson 7 Virtualization and Cloud Computing
Authored by Christina Bright
Other
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
59 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is NOT a task that a VPN concentrator is responsible for?
A VPN concentrator authenticates VPN clients.
A VPN concentrator manages encryption for VPN transmissions.
A VPN concentrator shuts down established connections with malicious traffic occurs.
A VPN concentrator establishes tunnels for VPN connections.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?
Dynamic Multipoint VPN
Auto Switched VPN Service
Symmetric VPN Autodial
Dynamic SmartVPN
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
File Transfer Protocol (FTP)
Trivial FTP (TFTP)
Secure FTP (SFTP)
FTP Secure (FTPS)
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?
VNC is faster than Remote Desktop, and requires less network bandwidth.
VNC is open source, allowing companies to develop their own software based on VNC.
VNC uses the Remote Desktop Protocol (RDP).
VNC is a standard developed by Microsoft and used by Windows Remote Desktop.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In order to generate a public and private key for use with SSH, what command line utility should you use?
ssh-keygen
key-generate
ssh-newkey
gpg --ssh
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
SSH provides a graphical view of the remote computer.
SSH does not protect against DNS spoofing
SSH does not protect against IP spoofing.
SSH supports port forwarding.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Why is the telnet utility a poor choice for remote access to a device?
It provides no mechanism for authentication.
It cannot be used over a public WAN connection.
It provides poor authentication and no encryption.
It does not allow for control of a computer remotely.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Other
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
15 questions
Main Idea and Supporting Details.
Quiz
•
4th - 11th Grade
12 questions
Add and Subtract Polynomials
Quiz
•
9th - 12th Grade
13 questions
Model Exponential Growth and Decay Scenarios
Quiz
•
9th - 12th Grade
27 questions
7.2.3 Quadrilateral Properties
Quiz
•
9th - 12th Grade
7 questions
Amoeba Sisters Dihybrid Cross Punnett Square
Interactive video
•
9th - 12th Grade
10 questions
The Holocaust: Historical Overview
Interactive video
•
9th - 12th Grade
10 questions
Key Features of Quadratic Functions
Interactive video
•
8th - 12th Grade