
Cloud Infrastructure Mechanisms
Authored by Avinash Kumar
Computers
University
Used 58+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which service offers isolation of a network environment from the rest of a communications network?
Logical network perimeter
Virtual network
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What service is implemented for point-to-point encryption of data packets sent between the communications endpoints?
Virtual Private Network
Virtual Firewall
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
All of the traffic to cloud-based IT resources flows through the __?__ to the cloud service firewalls that isolate every cloud consumer’s perimeter network
Demilitarized Zone
Logical network perimeter
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A logical network perimeter established between the external firewalls and its own firewalls to host proxy servers is called
DMZ
Virtual LAN
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The virtual firewall and the isolated virtual network jointly form logical network perimeter for
Cloud service consumer
Cloud service provider
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
A Virtual server is a form of virtualization software that ___ ?____ a physical server.
emulates
simulates
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is a true statement?
Virtual servers are created on top of the Physical servers via hypervisor and a central VIM
Physical servers are created on top of the Virtual servers via hypervisor and a central VIM
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?