Chapter 7 - Virtualization and Cloud
Computing UPDATED ACTUAL Exam
Questions and CORRECT Answers
B - CORRECT ANSWER - Regarding VNC (Virtual Network Computing or Virtual
Network Connection), what statement is accurate?
A. VNC uses the Remote Desktop Protocol (RDP).
B. VNC is open source, allowing companies to develop their own software based on VNC.
C. VNC is a standard developed by Microsoft and used by Windows Remote Desktop.
D. VNC is faster than Remote Desktop, and requires less network bandwidth.
A - CORRECT ANSWER - What is NOT a potential disadvantage of utilizing
virtualization?
A. Virtualization software increases the complexity of backups, making creation of usable
backups difficult.
B. Increased complexity and administrative burden can result from the use of virtual machines.
C. Multiple virtual machines contending for finite resources can compromise performance.
D. Licensing costs can be high due to every instance of commercial software requiring a separate
license.
D - CORRECT ANSWER - What cloud service model involves providing applications
through an online user interface, providing for compatibility with a multitude of different
operating systems and devices?
A. XaaS
B. PaaS
C. IaaS
D. SaaS
A - CORRECT ANSWER - What open-source VPN protocol utilizes OpenSSL for
encryption and has the ability to possibly cross firewalls where IPsec might be blocked?
, MGRADES
A. OpenVPN
B. Generic Routing Encapsulation (GRE)
C. Layer 2 Tunneling Protocol (L2TP)
D. Point-to-Point Tunneling Protocol (PPTP)
B - CORRECT ANSWER - Which of the following virtualization products is an example
of a bare-metal hypervisor?
A. VirtualBox
B. Citrix XenServer
C. Linux KVM
D. VMware Player
true - CORRECT ANSWER - An enterprise-wide VPN can include elements of both the
client-to-site and site-to-site models.
false - CORRECT ANSWER - The HTTPS (HTTP Secure) protocol utilizes the same TCP
port as HTTP, port 80.
B - CORRECT ANSWER - What term is used to describe a space that is rented at a data
center facility by a service provider?
A. service location (SL)
B. point of presence (PoP)
C. central service point (CSP)
D. locally exchanged data point (ledp)
D - CORRECT ANSWER - In order to generate a public and private key for use with
SSH, what command line utility should you use?
A. gpg --ssh
B. ssh-newkey