Deck 5: Cloud Connectivity and Troubleshooting

ملء الشاشة (f)
exit full mode
سؤال
Emina has three separate VPCs at the cloud service provider that her company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might she implement in order to accommodate that requirement?

A) VLANs
B) Internet connection sharing
C) Cloud peering
D) IPsec
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer?

A) Glue connectivity
B) Ephemeral sessions
C) Sticky sessions
D) One-time pad
سؤال
Angela has decided upon a multi-cloud deployment so that the company can continue to operate even if one of the cloud service providers experiences an outage. Which of the following explains the factor that was important to Angela in choosing this structure?

A) Cost optimization
B) Regulatory compliance
C) Cloudbursting
D) Disaster recovery
سؤال
Quinn is currently looking to deploy a new Microsoft SharePoint server farm, a web-based application, into its own VPC. Which of the following ports would be unnecessary for her to leave open on the firewall for usage or management purposes?

A) 22
B) 80
C) 443
D) 3389
سؤال
Marissa is wanting to implement a VPN at her company, but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?

A) L2TP
B) PPTP
C) GRE
D) OpenVPN
سؤال
Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?

A) GRE
B) PPTP
C) L2TP
D) OpenVPN
سؤال
Karen's manager knows that she is working on implementing a VPN connection between the company's on-premises data center and the cloud service provider her company uses. The manager approached her with a concern to make sure that she wasn't using an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following was most likely the protocol that the manager was concerned about?

A) L2TP
B) PPTP
C) GRE
D) OpenVPN
سؤال
Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?

A) VPN
B) VLAN
C) VNC
D) DNS
سؤال
Rita has decided that the servers in one of the VPCs that she manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should she disable on the firewall for that VPC?

A) 23
B) 53
C) 389
D) 636
سؤال
Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?

A) LAN
B) VLAN
C) VXLAN
D) CAN
سؤال
Tia has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated and she needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique she is looking to implement?

A) Cloud ripping
B) Cloudbursting
C) Cloud tipping
D) Cloud redirection
سؤال
Haley does not want to manually assign IP addresses to clients on one of the network segments that she manages. Instead, she wants clients to obtain an IP address from a server that manages a pool of IP addresses. Which of the following technologies should she implement?

A) DNS
B) DHCP
C) RIP
D) OSPF
سؤال
Patti's company has just migrated the only Windows server in a particular VPC to a different VPC. Which of the following should she do next?

A) Disable port 3389 on the firewall of the original VPC.
B) Disable port 22 on the firewall of the original VPC.
C) Disable port 53 on the firewall of the original VPC.
D) Disable port 110 on the firewall of the original VPC.
سؤال
Cara works for a startup company that up until now has been running on a single virtual machine. The virtual machine is starting to see capacity issues and she is unable to provision more CPU and memory resources to satisfy its needs. Which of the following would allow her to expand the capacity of her company's web server?

A) DHCP
B) VPN
C) Load balancer
D) OSPF
سؤال
Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?

A) Next server
B) DHCP servers
C) DNS servers
D) FQDN servers
سؤال
Shelley wants to make sure that any protocols not using encryption are blocked at the firewall for one of her VPCs. Which of the following protocols should she ensure has a deny rule enabled for it?

A) HTTPS
B) RDP
C) Telnet
D) SSH
سؤال
Jenna's cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company's website?

A) A
B) PTR
C) MX
D) AAAA
سؤال
Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs, but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?

A) L2TP
B) PPTP
C) GRE
D) PPP
سؤال
Nancy was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following should she read more about to find out how she can implement it?

A) PPTP
B) IPsec
C) GRE
D) L2TP
سؤال
Fredrica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?

A) VLAN
B) VPC
C) VNC
D) VLC
سؤال
Emily has just migrated the email from the company's on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn't being delivered to the new servers. Which of the following records does she still need to modify?

A) CNAME
B) PTR
C) SRV
D) MX
سؤال
Wanda is trying to determine which routes packets are traveling over when accessing the company's chosen cloud service provider. Which of the following Windows tools can help her discover that information?

A) trace
B) traceroute
C) tracer
D) tracert
سؤال
A year ago Yvette configured two servers on separate VLANs. She still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for her to do?

A) Migrate the servers to a VPC.
B) Merge the VLANs together so that they both use two VLAN IDs.
C) Create a route between the two VLANs so they know how to contact each other.
D) Convert the 2 VLANs into a single VXLAN.
سؤال
Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be?

A) dig
B) netstat
C) route
D) nslookup
سؤال
Adrienne wants to be able to analyze the traffic coming into a Linux server's network interface. Which of the following command line utilities will allow her to see this information?

A) tracert
B) arp
C) dig
D) tcpdump
سؤال
Ursula is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can she use to find that information?

A) tracert
B) tracer
C) trace
D) traceroute
سؤال
Uma has been analyzing the performance and baselines from her virtual machines that are on a cloud service provider's platform. She sees that they do not appear to be performing up to the standards that her cloud service provider guarantees. Which of the following documents outlines the standards that they are guaranteeing?

A) DRP
B) SLA
C) VPC
D) GRE
سؤال
Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use?

A) netstat
B) dig
C) route
D) arp
سؤال
Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information?

A) nslookup
B) arp
C) dig
D) ping
سؤال
Erma wants to look at the current IP configuration on a Linux server. Which of the following tools can she use to view this information? (Choose two)

A) ifconfig
B) ipconfig
C) ip
D) netconf
سؤال
Zoie is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. She wants to see what the current dynamic IP address is. Which of the following command line utilities can she use to view that information?

A) ifconfig
B) ipconfig
C) ip
D) netconfig
سؤال
Xena has noticed that traffic to her company's website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this?

A) GAN
B) GSLB
C) GCP
D) GIMP
سؤال
Victoria is trying to determine whether one of the new servers she set up on the cloud service provider is reachable and online from her current workstation. Which of the following tools is she most likely trying to use?

A) ping
B) route
C) display
D) netstat
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/33
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Cloud Connectivity and Troubleshooting
1
Emina has three separate VPCs at the cloud service provider that her company uses. Some of the services in each of the VPCs need to communicate with some of the services in other VPCs on that same CSP. Which of the following might she implement in order to accommodate that requirement?

A) VLANs
B) Internet connection sharing
C) Cloud peering
D) IPsec
C
2
Daisy is researching load balancing solutions to implement for a new application that she is tasked with designing and deploying the infrastructure for. One of the requirements is that a client should continue communicating with the same server for the duration of their web browsing session. Which of the following features should she look for in the load balancer?

A) Glue connectivity
B) Ephemeral sessions
C) Sticky sessions
D) One-time pad
C
3
Angela has decided upon a multi-cloud deployment so that the company can continue to operate even if one of the cloud service providers experiences an outage. Which of the following explains the factor that was important to Angela in choosing this structure?

A) Cost optimization
B) Regulatory compliance
C) Cloudbursting
D) Disaster recovery
D
4
Quinn is currently looking to deploy a new Microsoft SharePoint server farm, a web-based application, into its own VPC. Which of the following ports would be unnecessary for her to leave open on the firewall for usage or management purposes?

A) 22
B) 80
C) 443
D) 3389
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
5
Marissa is wanting to implement a VPN at her company, but knows that some of the places the users need to connect from have issues with IPsec being used through the firewall. Which of the following protocols should she choose?

A) L2TP
B) PPTP
C) GRE
D) OpenVPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
6
Ophelia wants to create a VPN that uses SSL or TLS for the encryption. Which of the following protocols should she choose?

A) GRE
B) PPTP
C) L2TP
D) OpenVPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
7
Karen's manager knows that she is working on implementing a VPN connection between the company's on-premises data center and the cloud service provider her company uses. The manager approached her with a concern to make sure that she wasn't using an older data link layer protocol developed by Microsoft that is no longer considered secure. Which of the following was most likely the protocol that the manager was concerned about?

A) L2TP
B) PPTP
C) GRE
D) OpenVPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
8
Breanne wants to create a tunneled connection between her on-premises data center and the cloud service provider that her company uses. Which of the following would allow her to create that connection?

A) VPN
B) VLAN
C) VNC
D) DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
9
Rita has decided that the servers in one of the VPCs that she manages should only be reachable by IP address and they should not be able to perform any domain name lookups from the Internet. Which of the following ports should she disable on the firewall for that VPC?

A) 23
B) 53
C) 389
D) 636
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
10
Greta manages the on-premises networks for her company's Atlanta and Orlando offices. She hears about a technology that will allow her to connect certain network segments in Atlanta to their counterparts in Orlando by inserting the MAC address into layer 4 for UDP transport over the Internet. What is the technology that she has heard about that she should research more about in order to implement?

A) LAN
B) VLAN
C) VXLAN
D) CAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
11
Tia has been analyzing the on-premises data center and determined that the data center can handle most of the traffic on a day-to-day basis. However, there are times when the bandwidth becomes saturated and she needs to find a solution to push the excess traffic out to virtual machines on a cloud service provider. Which of the following describes the technique she is looking to implement?

A) Cloud ripping
B) Cloudbursting
C) Cloud tipping
D) Cloud redirection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
12
Haley does not want to manually assign IP addresses to clients on one of the network segments that she manages. Instead, she wants clients to obtain an IP address from a server that manages a pool of IP addresses. Which of the following technologies should she implement?

A) DNS
B) DHCP
C) RIP
D) OSPF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
13
Patti's company has just migrated the only Windows server in a particular VPC to a different VPC. Which of the following should she do next?

A) Disable port 3389 on the firewall of the original VPC.
B) Disable port 22 on the firewall of the original VPC.
C) Disable port 53 on the firewall of the original VPC.
D) Disable port 110 on the firewall of the original VPC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
14
Cara works for a startup company that up until now has been running on a single virtual machine. The virtual machine is starting to see capacity issues and she is unable to provision more CPU and memory resources to satisfy its needs. Which of the following would allow her to expand the capacity of her company's web server?

A) DHCP
B) VPN
C) Load balancer
D) OSPF
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
15
Ingrid has configured one of the network segments to use a DHCP server to dynamically assign IP addresses. She knows that DHCP can also tell the clients the address of the server that they should use to resolve FQDNs to IP addresses. Which of the following settings should she configure?

A) Next server
B) DHCP servers
C) DNS servers
D) FQDN servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
16
Shelley wants to make sure that any protocols not using encryption are blocked at the firewall for one of her VPCs. Which of the following protocols should she ensure has a deny rule enabled for it?

A) HTTPS
B) RDP
C) Telnet
D) SSH
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
17
Jenna's cloud service provider has just started supporting IPv6. She wants her web servers there to be accessible by both IPv4 and IPv6. Which of the following records should she add to the DNS configuration to ensure that IPv6 clients can access her company's website?

A) A
B) PTR
C) MX
D) AAAA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
18
Lara is trying to decide on a protocol to use for a VPN to connect from one cloud service provider to another. She knows there are a variety of protocols out there that can be used for VPNs, but wants to make sure she chooses one that both cloud service providers support and that can be combined with IPsec. Which of the following protocols would she most likely need to choose?

A) L2TP
B) PPTP
C) GRE
D) PPP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
19
Nancy was recently reading about a network layer protocol that provides encryption, authentication, and key management for TCP/IP transmissions that is built into the IPv6 protocol stack. Which of the following should she read more about to find out how she can implement it?

A) PPTP
B) IPsec
C) GRE
D) L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
20
Fredrica is installing more infrastructure in her company's on-premises data center. She has installed 10 servers, but there is only one switch in the rack that the new equipment is going in. Which of the following technologies can she use to segment the servers into two groups without having to add a new switch that will also put them into separate broadcast domains?

A) VLAN
B) VPC
C) VNC
D) VLC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
21
Emily has just migrated the email from the company's on-premises data center to a cloud service provider. She has modified the appropriate A records, but e-mail isn't being delivered to the new servers. Which of the following records does she still need to modify?

A) CNAME
B) PTR
C) SRV
D) MX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
22
Wanda is trying to determine which routes packets are traveling over when accessing the company's chosen cloud service provider. Which of the following Windows tools can help her discover that information?

A) trace
B) traceroute
C) tracer
D) tracert
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
23
A year ago Yvette configured two servers on separate VLANs. She still needs them to remain on separate VLANs, but now has a need for them to be able to send certain communications to each other over a certain port. Which of the following will be necessary for her to do?

A) Migrate the servers to a VPC.
B) Merge the VLANs together so that they both use two VLAN IDs.
C) Create a route between the two VLANs so they know how to contact each other.
D) Convert the 2 VLANs into a single VXLAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
24
Isabel is troubleshooting a DNS issue on one of her Windows servers. Which of the following commands might let her look up the DNS records so she can track down where the problem might be?

A) dig
B) netstat
C) route
D) nslookup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
25
Adrienne wants to be able to analyze the traffic coming into a Linux server's network interface. Which of the following command line utilities will allow her to see this information?

A) tracert
B) arp
C) dig
D) tcpdump
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
26
Ursula is working on a Linux system and wants to determine which routers a packet will traverse when a packet is sent to a certain destination. Which of the following command line tools can she use to find that information?

A) tracert
B) tracer
C) trace
D) traceroute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
27
Uma has been analyzing the performance and baselines from her virtual machines that are on a cloud service provider's platform. She sees that they do not appear to be performing up to the standards that her cloud service provider guarantees. Which of the following documents outlines the standards that they are guaranteeing?

A) DRP
B) SLA
C) VPC
D) GRE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
28
Olivia manages a group of Windows and Linux servers. She knows there is a command that she can use to view currently open network connections that works on both platforms. Which of the following commands will she most likely use?

A) netstat
B) dig
C) route
D) arp
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
29
Yolanda wants to see a list of MAC addresses that one of her servers has been communicating with. Which of the following command line tools will display that information?

A) nslookup
B) arp
C) dig
D) ping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
30
Erma wants to look at the current IP configuration on a Linux server. Which of the following tools can she use to view this information? (Choose two)

A) ifconfig
B) ipconfig
C) ip
D) netconf
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
31
Zoie is working on a Windows server that has two network interfaces. One is assigned an IP address by a DHCP server while the other is a static IP address. She wants to see what the current dynamic IP address is. Which of the following command line utilities can she use to view that information?

A) ifconfig
B) ipconfig
C) ip
D) netconfig
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
32
Xena has noticed that traffic to her company's website has been increasing from across the world. She has decided to start deploying copies of that server to various regions and wants to direct traffic to the site that is closest to each user. Which of the following technologies could she use to do this?

A) GAN
B) GSLB
C) GCP
D) GIMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
33
Victoria is trying to determine whether one of the new servers she set up on the cloud service provider is reachable and online from her current workstation. Which of the following tools is she most likely trying to use?

A) ping
B) route
C) display
D) netstat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 33 في هذه المجموعة.