Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Carl has created a virtual machine on the cloud service provider that his company uses and has given it a static private IP address. He

Carl has created a virtual machine on the cloud service provider that his company uses and has given it a static private IP address. He wants to make this server is the new web server for the company's website. Which of the following is required to allow that server to perform in that role?

a. IG
b. IGMP
c. IGRP
d. IDS

Michonne currently manages a private cloud that has been built out in an on-premises data center. Some of the servers are reaching the end of their life and she has been tasked with finding a solution that minimizes the amount of capital investment necessary. Which of the following might she choose to implement for her company?

a. VPC
b. VNC
c. VPN
d. VDI

Negan has been given the 10.50.0.0/16 subnet to create the cloud infrastructure necessary for a new subsidiary that his company is creating, Zombies Inc. He wants to create a minimum of 500 smaller networks that can hold 100 servers each out of that space to minimize broadcast traffic within each subnet. Which of the following CIDR masks could he use to meet his requirements?

a. /22
b. /23
c. /24
d. /25
e. /26

Maggie wants to create a small subnetwork for the Human Resources servers that her organization uses. There are currently 10 servers, but she also needs to plan for 50 percent growth over the next two years. Which of the following subnet masks would give her adequate IP address space while leaving the fewest number of unused IP addresses in the block?

a. 255.255.255.128
b. 255.255.255.224
c. 255.255.255.240
d. 255.255.255.248

Darryl has been given the 10.20.30.64/26 network to use for a set of virtual machines that he is provisioning on his company's private cloud. He has been told to configure the last usable IP address in the range as the gateway, or router, address. Which of the following IP addresses should he use for the gateway?

a. 10.20.30.127
b. 10.20.30.126
c. 10.20.30.254
d. 10.20.30.94

Carol has created a subnet of 10.20.30.0/27. Which of the following is the address that is used for broadcast messages within the subnet?

a. 10.20.30.30
b. 10.20.30.32
c. 10.20.30.1
d. 10.20.30.31

Morgan has hardened the virtual machines in the subnet he's just finished creating by turning off unnecessary services that were running in the background. However, he still wants to prevent unnecessary traffic from getting to the servers in the first place. Which of the following might he choose to implement in his cloud environment?

a. Virtual firewall
b. Internet gateway
c. VNC
d. Virtual switch

Glenn has been tasked with creating a few new virtual machines for a new project that will be used by the finance department. It will contain sensitive data about the company and its operations. Which of the following is the most important thing for Glenn to consider as he's creating the virtual machines?

a. Which operating system is being used for the servers
b. Which region he is creating the virtual machines in
c. How much disk space is being allocated
d. How much memory is being allocated for each virtual machine

Enid is implementing new systems on a cloud service provider and needs to ensure that the finance systems and HR systems cannot communicate with each other without going through a virtual router. Which of the following should she implement?

a. Different cloud service providers for each department
b. An Internet gateway
c. Network address translation
d. Different subnets for each department

Eugene has been given the subnet 10.20.30.0/24 to use for the creation of a group of virtual machines to be used for the sales department. He is used to seeing a subnet mask in the format of four numbers separated by periods (255.255.255.0) along with the subnet ID, but isn't familiar with what the slash and a number mean after the subnet ID. He asks you to help him interpret the information. What term should you tell him to search for on a search engine to learn more about this topic?

a. CIDR
b. VPN
c. DDN
d. VLAN

Ezekiel wants to ensure that several of the cloud resources he is responsible for managing are always available. Which of the following might best help him meet his goals of high availability?

a. Offsite backup to another region
b. Site mirroring between two or more regions
c. Daily replication to another region
d. Warm site

Dwight has just moved all of the Linux servers from the VPC that they shared with some Windows servers to another VPC. Which of the following does he most likely need to do?

a. Remove the rules that allow port 53 from the firewall to the original VPC.
b. Remove the rules that allow port 22 from the firewall to the original VPC.
c. Remove the rules that allow port 443 from the firewall to the original VPC.
d. Remove the rules that allow port 3389 from the firewall to the original VPC.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Marketing The New Profit Frontier

Authors: Ed Burnett

1st Edition

0964535629, 978-0964535626

More Books

Students also viewed these Databases questions