Craig Zacker

CompTIA Network+ Practice Tests


Скачать книгу

Channel cannot.

      268 Which of the following Storage Area Network (SAN) technologies is primarily used by supercomputers as a high-speed, low-latency connection between Central Processing Units (CPUs) and storage systems?InfiniBandFibre ChanneliSCSIFCoE

      269 Which of the following is the term for the client that accesses an iSCSI device on a storage area network?InitiatorTargetControllerAdapter

      270 Which of the following protocols are included in an iSCSI packet? (Choose all that apply.)EthernetIPTCPUDPNone of the above

      271 Which of the following protocols are included in a Fibre Channel packet?EthernetIPTCPUDPNone of the above

      272 Which of the following protocol standards defines a layered implementation that does not correspond to the layers of the Open Systems Interconnection (OSI) model?iSCSIFibre ChannelPPPRDMA

      273 Which of the following protocols are included in an FCoE packet?EthernetIPTCPUDPNone of the above

      274 Which of the following protocols uses jumbo frames to increase performance levels on storage area networks?EthernetIPFibre ChanneliSCSI

      275 Which of the following is not the name of one of the layers in the three-tier datacenter architecture?CoreIntermediateDistributionAccess

      276 Which of the following is not a reason why the leaf and spine datacenter topology is superior to the standard three-tier topology?The leaf and spine arrangement uses a full mesh switching topology.In a leaf and spine topology, all data flows require the same number of hops.The leaf and spine topology is less expensive to implement than the three-tier topology.The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol.

      277 Which of the following best describes the difference between east-west and north-south traffic in a datacenter?East-west describes traffic between devices at the same layer of the OSI model, while north-south describes traffic between OSI model layers.East-west is switch-to-switch traffic, while north-south is switch-to-router traffic.East-west traffic stays within the datacenter, while north-south traffic does not.East-west is backbone traffic among switches and routers, while north-south is traffic to end systems, such as servers.

      278 Top-of-rack switches most commonly form which layer of the datacenter topology?LeafBackboneSpineCore

      279 Which of the following layers in a Software-Defined Network (SDN) architecture consists of hardware devices?ApplicationControlInfrastructureCore

      280 In a Software Defined Network (SDN), as defined in the RFC 7426 specification, a plane is a set of resources related to a particular function. Which of the following is not one of the five planes defined in the SDN architecture?ForwardingOperationalControlManagementInfrastructureApplication

      281 Ralph is designing the datacenter for his company's new branch office. He is considering various options, including building a new datacenter at the branch office facility, using a colocated datacenter, and creating a virtual datacenter using a public cloud provider. Which of the following statements about the differences between these options are true? (Choose all that apply.)A colocated datacenter would be less expensive to implement than a branch office or public cloud datacenter.In a branch office or colocated datacenter, Ralph's company would own the hardware.In all three datacenter options, the administrators in Ralph's company would be responsible for setting up and managing the hardware.In a branch office or colocated datacenter, Ralph's company would be responsible for all utility costs, including heating, cooling, and power.A public cloud datacenter would have greater physical security than the other two options.A public cloud datacenter is easier to expand than a colocated or branch office datacenter

      282 Which of the following cloud service models enables you to perform a new installation of an operating system of your choice?IaaSPaaSSaaSDaaSAll of the above

      283 When you contract with a provider to obtain email services for your company using their servers in the public cloud, which of the following service models are you using?IaaSPaaSSaaSDaaSNone of the above

      284 Which of the following cloud service models provides the consumer with the most control over the cloud resources?IaaSPaaSSaaSDaaSIaaS, PaaS, SaaS, and DaaS all provide the same degree of control.

      285 Alice has just created a new Windows Server 2016 virtual machine using remote controls provided by a cloud service provider on the Internet. Which of the following cloud architectures is she using? (Choose all that apply.)IaaSPaaSSaaSPublic cloudPrivate cloudHybrid cloudCommunity cloud

      286 In which of the following cloud models can a single organization function as both the provider and the consumer of all cloud services?Public cloudPrivate cloudHybrid cloudAd hoc cloud

      287 Ed is the overnight manager of his company's datacenter, and he is responsible for both private and public resources in the company's hybrid cloud. Due to a new TV commercial shown that night, the company's website experiences a massive upsurge in traffic. The web server farm on the private cloud is being overwhelmed, so Ed configures some virtual machines in the public cloud to take up the slack. Which of the following is a common term for what Ed has done?Cloud bustingCloud burstingCloud splittingCloud migrating

      288 Microsoft's Outlook.com email service is an example of which of the following cloud service models?IaaSPaaSSaaSDaaSNone of the above

      289 Which of the following statements about cloud delivery models is true?A public cloud is inherently insecure because anyone can access it.A private cloud consists of hardware that is all located in a single datacenter.A hybrid cloud enables administrators to migrate services between public and private resources.Public, private, and hybrid clouds all utilize the same hardware resources.

      290 Ed has just created a new Windows application for his company, and he wants to deploy it in the public cloud. He is looking for a provider that will furnish his company with a fully installed and configured Windows server on which he can install and run his application. Which of the following service models is he seeking to use?IaaSPaaSSaaSDaaSNone of the above

      291 Which of the following are valid advantages or disadvantages of multitenancy in a public cloud datacenter? (Choose all that apply.)Multitenancy presents a potential security risk because other tenants are utilizing the same hardware.Multitenancy reduces the cost of utilities and other overhead.Multitenancy introduces the possibility of competition for bandwidth with other tenants.Multitenancy separates tenants by assigning each one its own virtual machine.

      292 Which of the following is not one of the advantages of Infrastructure as Code (IaC) deployment for cloud-based virtual machines?IaC provides rapid deployment of virtual machine configurations.IaC provides consistency in virtual machine configurations.IaC provides cost savings by automating the virtual machine configuration process.IaC provides increased security by encrypting the virtual machine configurationIaC provides elasticity and scalability by simplifying the virtual machine deployment process.

      293 Ralph is designing a hybrid deployment for a corporate client that will require a connection between the client's private network and a public cloud provider. The client is concerned about this connection becoming a speed bottleneck at times of heavy user traffic. Which of the following options can Ralph offer the client that will best address this potential problem?Use a different ISP for the cloud connection.Use a VPN for the cloud connection.Use a cloud direct connection for the hybrid link.Use a leased line connection to the ISP

       THE COMPTIA NETWORK+ EXAM N10-008 TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:

       2.1 Compare and contrast various devices, their features, and their appropriate placement on the network.Networking devicesLayer 2 switchLayer 3 capable switchRouterHubAccess pointBridgeWireless LAN controllerLoad balancerProxy serverCable modemDSL modemRepeaterVoice gatewayMedia converterIntrusion prevention system (IPS)/intrusion detection system (IDS) deviceFirewallVPN headend Networked devicesVoice over Internet Protocol (VoIP) phonePrinterPhysical access control devicesCamerasHeating, ventilation, and air conditioning (HVAC) sensorsInternet