CIST 1401 Section 9.1-9.5 PQ

You are in the process of configuring an iSCSI storage area network (SAN) for your network.
You want to configure a Windows Server 2016 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec.
Which tool should you use?
Click the card to flip 👆
1 / 31
Terms in this set (31)
You are in the process of configuring an iSCSI storage area network (SAN) for your network.
You want to configure a Windows Server 2016 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec.
Which tool should you use?
Which of the following protocols is an open source protocol used by most manufacturers of VoIP systems?Session initiation protocol (SIP)Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call?SIPYour company uses VoIP for phone calls. Recently, employees have been complaining about phone calls with unusual sound effects. Which type of problem is occurring on the VoIP system?JitterYou are on a phone call using VoIP. You notice that it takes several seconds for the person on the other end to respond to questions you ask. Which type of problem is occurring?LatencyWhat is a soft phone?A software application that runs on a computer or other device that accesses a VoIP server to make real-time phone calls.Which switch features are typically used with VoIP? (Select two.)PoE VLANWhich of the following features is used with digital IP phones to supply power through a switch port?PoEIn virtualization, what is the role of the hypervisor?A hypervisor allows virtual machines to interact with the hardware without going through the host operating system.What type of virtualization completely simulates a real physical host?Full virtualizationWhich component is most likely to allow physical and virtual machines to communicate with each other?Virtual switchWhich of the following are advantages of virtualization? (Select two.)Easy system migration to different hardware Centralized administrationYou need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement?Virtual serversYou are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating system versions and editions. Currently, all of your testing virtual machines are connected to the production network through the hypervisor's network interface. You are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code. To prevent problems, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other. What should you do? (Select two. Each response is one part of the complete solution.)Create a new virtual switch configured for host-only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working. To keep this from happening again, you decide to test all updates on a virtual machine before allowing them to be installed on production workstations. Currently, none of your testing virtual machines has a network connection. However, they need to be able to connect to the update servers at Microsoft to download and install updates. What should you do? (Select two. Each response is one part of the complete solution.)Create a new virtual switch configured for bridged (external) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.What key advantage does a virtual router have over a physical router?Multiple networks can be connected to a single interface.You want to be able to monitor and filter VM-to-VM traffic within a virtual network. What should you do?Implement a virtual firewall within the hypervisor.Which of the following statements about virtual NICs are true? (Select two.)Virtual NICs need the appropriate driver installed to function. Multiple virtual NICs can be added to a virtual machine.Which of the following cloud computing solutions will deliver software applications to a client either over the internet or on a local area network?SaaSWhich of the following best describes the platform as a service (PaaS) cloud computing service model?PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.Which of the following are true regarding cloud computing? (Select three.)Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a web browser. Cloud computing is software, data access, computation, and storage services provided to clients through the internet. The term "cloud" is used as a synonym for the internet.You were recently hired by a small start-up company. The company is in a small office and has several remote employees. You have been asked to find a business service that would accommodate the current size of the company, but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power. Which cloud service model should you use?IaaS