Deck 10: Virtual Networks and Remote Access

ملء الشاشة (f)
exit full mode
سؤال
____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network.

A) Dialed networking
B) Traditional networking
C) Dial-up networking
D) Virtual networking
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A ____ uses very little hard disk space or processing power from the workstation on which it is installed.

A) thick client
B) fat client
C) thin client
D) virtual client
سؤال
PPTP and L2TP are the only protocols that can be used to carry VPN traffic.
سؤال
____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.

A) Host-only
B) NAT
C) Bridged
D) Blocked
سؤال
Using a virtualization program, you can create dozens of different VMs.
سؤال
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.

A) guest machine
B) reference machine
C) host machine
D) management machine
سؤال
____ connect vNICs with a network, whether virtual or physical.

A) Virtual routers
B) Virtual crossovers
C) Virtual duplexers
D) Virtual bridges
سؤال
To connect to a network, a virtual machine requires a ____.

A) virtual switch
B) virtual adapter
C) physical switch
D) virtual MAC address
سؤال
The physical computer on a virtual machine is known as a ____.

A) guest
B) client
C) host
D) server
سؤال
Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
سؤال
____ is the most widely implemented virtualization software today.

A) Hyper-V
B) Citrix
C) VirtualBox
D) VMware
سؤال
Each VM is known as a ____.

A) guest
B) host
C) client
D) node
سؤال
Upon creation, each vNIC is automatically assigned a ____.

A) MAC address
B) switch address
C) block address
D) reference address
سؤال
____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.

A) Remote Desktop
B) VNC
C) Citrix
D) Xen
سؤال
The software required to establish VPNs is usually expensive.
سؤال
A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
سؤال
When a server compares a user's credentials with those in its database, the process is known as ____.

A) authorization
B) authentication
C) administration
D) accounting
سؤال
In the case of dial-up networking, the term ____ refers to a modem.

A) serial connection
B) virtual connection
C) physical connection
D) POTS connection
سؤال
____ is the remote virtual computing software that comes with Windows client and server operating systems.

A) Remote Server
B) Remote Client
C) Remote Windows
D) Remote Desktop
سؤال
____ are wide area networks that are logically defined over public transmission systems.

A) VPNs
B) Leased lines
C) Private lines
D) Dial-up lines
سؤال
Describe the purpose of RRAS and how it is used.
سؤال
On network diagrams, the Internet is frequently depicted as a ____.

A) block
B) cloud
C) line
D) lightening bolt
سؤال
VPNs can be classified based on the kinds of ____ they connect.

A) hardware
B) software
C) endpoints
D) circuits
سؤال
Where do virtual switches or bridges and their configuration reside?
سؤال
In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
سؤال
List two potential disadvantages to create multiple guests on a single host machine.
سؤال
The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.
سؤال
A VPN tunneling protocol operates at the ____ layer.

A) Network
B) Application
C) Session
D) Data Link
سؤال
What are three advantages of virtualization?
سؤال
In a ____ VPN, tunnels connect multiple sites on a WAN.

A) site-to-site
B) site-to-client
C) client-to-client
D) link-to-line
سؤال
Describe how remote virtual computing is used.
سؤال
Describe PPPoE.
سؤال
____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.

A) Virtual
B) Physical
C) Material
D) Guest
سؤال
What are two important considerations when designing a VPN?
سؤال
In ____, each datagram can follow one of many paths to reach its destination.

A) circuit switching
B) line switching
C) packet switching
D) data switching
سؤال
____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.
سؤال
Describe the L2TP technology.
سؤال
In bridged mode, a(n) ____________________ accesses a physical network using the host machine's NIC.
سؤال
A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.
سؤال
Describe metered service.
سؤال
List two things that distinguish cloud computing.
سؤال
Match between columns
The emulation of a computer, operating system environment, or application on a physical system.
Virtualization
The emulation of a computer, operating system environment, or application on a physical system.
open source
The emulation of a computer, operating system environment, or application on a physical system.
Tunnel
The emulation of a computer, operating system environment, or application on a physical system.
L2TP
The emulation of a computer, operating system environment, or application on a physical system.
elastic
The emulation of a computer, operating system environment, or application on a physical system.
Multitenant
The emulation of a computer, operating system environment, or application on a physical system.
NaaS
The emulation of a computer, operating system environment, or application on a physical system.
XaaS
The emulation of a computer, operating system environment, or application on a physical system.
cloud services
When multiple customers share storage locations or services without knowing it.
Virtualization
When multiple customers share storage locations or services without knowing it.
open source
When multiple customers share storage locations or services without knowing it.
Tunnel
When multiple customers share storage locations or services without knowing it.
L2TP
When multiple customers share storage locations or services without knowing it.
elastic
When multiple customers share storage locations or services without knowing it.
Multitenant
When multiple customers share storage locations or services without knowing it.
NaaS
When multiple customers share storage locations or services without knowing it.
XaaS
When multiple customers share storage locations or services without knowing it.
cloud services
The virtual connection between two VPN endpoints.
Virtualization
The virtual connection between two VPN endpoints.
open source
The virtual connection between two VPN endpoints.
Tunnel
The virtual connection between two VPN endpoints.
L2TP
The virtual connection between two VPN endpoints.
elastic
The virtual connection between two VPN endpoints.
Multitenant
The virtual connection between two VPN endpoints.
NaaS
The virtual connection between two VPN endpoints.
XaaS
The virtual connection between two VPN endpoints.
cloud services
Software whose code is publicly available for use and modification.
Virtualization
Software whose code is publicly available for use and modification.
open source
Software whose code is publicly available for use and modification.
Tunnel
Software whose code is publicly available for use and modification.
L2TP
Software whose code is publicly available for use and modification.
elastic
Software whose code is publicly available for use and modification.
Multitenant
Software whose code is publicly available for use and modification.
NaaS
Software whose code is publicly available for use and modification.
XaaS
Software whose code is publicly available for use and modification.
cloud services
A service provider offers its customers a complete set of networking services.
Virtualization
A service provider offers its customers a complete set of networking services.
open source
A service provider offers its customers a complete set of networking services.
Tunnel
A service provider offers its customers a complete set of networking services.
L2TP
A service provider offers its customers a complete set of networking services.
elastic
A service provider offers its customers a complete set of networking services.
Multitenant
A service provider offers its customers a complete set of networking services.
NaaS
A service provider offers its customers a complete set of networking services.
XaaS
A service provider offers its customers a complete set of networking services.
cloud services
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Virtualization
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
open source
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Tunnel
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
L2TP
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
elastic
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Multitenant
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
NaaS
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
XaaS
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
cloud services
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Virtualization
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
open source
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Tunnel
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
L2TP
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
elastic
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Multitenant
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
NaaS
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
XaaS
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
cloud services
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Virtualization
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
open source
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Tunnel
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
L2TP
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
elastic
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Multitenant
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
NaaS
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
XaaS
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
cloud services
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Virtualization
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
open source
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Tunnel
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
L2TP
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
elastic
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Multitenant
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
NaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
XaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
cloud services
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Virtual Networks and Remote Access
1
____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network.

A) Dialed networking
B) Traditional networking
C) Dial-up networking
D) Virtual networking
C
2
A ____ uses very little hard disk space or processing power from the workstation on which it is installed.

A) thick client
B) fat client
C) thin client
D) virtual client
C
3
PPTP and L2TP are the only protocols that can be used to carry VPN traffic.
False
4
____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.

A) Host-only
B) NAT
C) Bridged
D) Blocked
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
Using a virtualization program, you can create dozens of different VMs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.

A) guest machine
B) reference machine
C) host machine
D) management machine
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ connect vNICs with a network, whether virtual or physical.

A) Virtual routers
B) Virtual crossovers
C) Virtual duplexers
D) Virtual bridges
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
To connect to a network, a virtual machine requires a ____.

A) virtual switch
B) virtual adapter
C) physical switch
D) virtual MAC address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The physical computer on a virtual machine is known as a ____.

A) guest
B) client
C) host
D) server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ is the most widely implemented virtualization software today.

A) Hyper-V
B) Citrix
C) VirtualBox
D) VMware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
Each VM is known as a ____.

A) guest
B) host
C) client
D) node
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Upon creation, each vNIC is automatically assigned a ____.

A) MAC address
B) switch address
C) block address
D) reference address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.

A) Remote Desktop
B) VNC
C) Citrix
D) Xen
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The software required to establish VPNs is usually expensive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
When a server compares a user's credentials with those in its database, the process is known as ____.

A) authorization
B) authentication
C) administration
D) accounting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
In the case of dial-up networking, the term ____ refers to a modem.

A) serial connection
B) virtual connection
C) physical connection
D) POTS connection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ is the remote virtual computing software that comes with Windows client and server operating systems.

A) Remote Server
B) Remote Client
C) Remote Windows
D) Remote Desktop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ are wide area networks that are logically defined over public transmission systems.

A) VPNs
B) Leased lines
C) Private lines
D) Dial-up lines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Describe the purpose of RRAS and how it is used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
On network diagrams, the Internet is frequently depicted as a ____.

A) block
B) cloud
C) line
D) lightening bolt
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
VPNs can be classified based on the kinds of ____ they connect.

A) hardware
B) software
C) endpoints
D) circuits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Where do virtual switches or bridges and their configuration reside?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
List two potential disadvantages to create multiple guests on a single host machine.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
A VPN tunneling protocol operates at the ____ layer.

A) Network
B) Application
C) Session
D) Data Link
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are three advantages of virtualization?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
In a ____ VPN, tunnels connect multiple sites on a WAN.

A) site-to-site
B) site-to-client
C) client-to-client
D) link-to-line
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Describe how remote virtual computing is used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe PPPoE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.

A) Virtual
B) Physical
C) Material
D) Guest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
What are two important considerations when designing a VPN?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
In ____, each datagram can follow one of many paths to reach its destination.

A) circuit switching
B) line switching
C) packet switching
D) data switching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe the L2TP technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
In bridged mode, a(n) ____________________ accesses a physical network using the host machine's NIC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe metered service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
List two things that distinguish cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
The emulation of a computer, operating system environment, or application on a physical system.
Virtualization
The emulation of a computer, operating system environment, or application on a physical system.
open source
The emulation of a computer, operating system environment, or application on a physical system.
Tunnel
The emulation of a computer, operating system environment, or application on a physical system.
L2TP
The emulation of a computer, operating system environment, or application on a physical system.
elastic
The emulation of a computer, operating system environment, or application on a physical system.
Multitenant
The emulation of a computer, operating system environment, or application on a physical system.
NaaS
The emulation of a computer, operating system environment, or application on a physical system.
XaaS
The emulation of a computer, operating system environment, or application on a physical system.
cloud services
When multiple customers share storage locations or services without knowing it.
Virtualization
When multiple customers share storage locations or services without knowing it.
open source
When multiple customers share storage locations or services without knowing it.
Tunnel
When multiple customers share storage locations or services without knowing it.
L2TP
When multiple customers share storage locations or services without knowing it.
elastic
When multiple customers share storage locations or services without knowing it.
Multitenant
When multiple customers share storage locations or services without knowing it.
NaaS
When multiple customers share storage locations or services without knowing it.
XaaS
When multiple customers share storage locations or services without knowing it.
cloud services
The virtual connection between two VPN endpoints.
Virtualization
The virtual connection between two VPN endpoints.
open source
The virtual connection between two VPN endpoints.
Tunnel
The virtual connection between two VPN endpoints.
L2TP
The virtual connection between two VPN endpoints.
elastic
The virtual connection between two VPN endpoints.
Multitenant
The virtual connection between two VPN endpoints.
NaaS
The virtual connection between two VPN endpoints.
XaaS
The virtual connection between two VPN endpoints.
cloud services
Software whose code is publicly available for use and modification.
Virtualization
Software whose code is publicly available for use and modification.
open source
Software whose code is publicly available for use and modification.
Tunnel
Software whose code is publicly available for use and modification.
L2TP
Software whose code is publicly available for use and modification.
elastic
Software whose code is publicly available for use and modification.
Multitenant
Software whose code is publicly available for use and modification.
NaaS
Software whose code is publicly available for use and modification.
XaaS
Software whose code is publicly available for use and modification.
cloud services
A service provider offers its customers a complete set of networking services.
Virtualization
A service provider offers its customers a complete set of networking services.
open source
A service provider offers its customers a complete set of networking services.
Tunnel
A service provider offers its customers a complete set of networking services.
L2TP
A service provider offers its customers a complete set of networking services.
elastic
A service provider offers its customers a complete set of networking services.
Multitenant
A service provider offers its customers a complete set of networking services.
NaaS
A service provider offers its customers a complete set of networking services.
XaaS
A service provider offers its customers a complete set of networking services.
cloud services
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Virtualization
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
open source
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Tunnel
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
L2TP
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
elastic
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
Multitenant
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
NaaS
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
XaaS
May be managed and delivered by a service provider over public transmission lines, such as the Internet.
cloud services
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Virtualization
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
open source
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Tunnel
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
L2TP
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
elastic
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
Multitenant
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
NaaS
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
XaaS
Services and storage capacity can be quickly and dynamically-sometimes even automatically-scaled up or down.
cloud services
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Virtualization
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
open source
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Tunnel
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
L2TP
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
elastic
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Multitenant
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
NaaS
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
XaaS
The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
cloud services
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Virtualization
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
open source
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Tunnel
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
L2TP
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
elastic
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
Multitenant
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
NaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
XaaS
A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
cloud services
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.