Channel cannot.
268 Which of the following Storage Area Network (SAN) technologies is primarily used by supercomputers as a high-speed, low-latency connection between Central Processing Units (CPUs) and storage systems?InfiniBandFibre ChanneliSCSIFCoE
269 Which of the following is the term for the client that accesses an iSCSI device on a storage area network?InitiatorTargetControllerAdapter
270 Which of the following protocols are included in an iSCSI packet? (Choose all that apply.)EthernetIPTCPUDPNone of the above
271 Which of the following protocols are included in a Fibre Channel packet?EthernetIPTCPUDPNone of the above
272 Which of the following protocol standards defines a layered implementation that does not correspond to the layers of the Open Systems Interconnection (OSI) model?iSCSIFibre ChannelPPPRDMA
273 Which of the following protocols are included in an FCoE packet?EthernetIPTCPUDPNone of the above
274 Which of the following protocols uses jumbo frames to increase performance levels on storage area networks?EthernetIPFibre ChanneliSCSI
275 Which of the following is not the name of one of the layers in the three-tier datacenter architecture?CoreIntermediateDistributionAccess
276 Which of the following is not a reason why the leaf and spine datacenter topology is superior to the standard three-tier topology?The leaf and spine arrangement uses a full mesh switching topology.In a leaf and spine topology, all data flows require the same number of hops.The leaf and spine topology is less expensive to implement than the three-tier topology.The leaf and spine topology uses software-defined networking to direct traffic, rather than blocking ports using the spanning tree protocol.
277 Which of the following best describes the difference between east-west and north-south traffic in a datacenter?East-west describes traffic between devices at the same layer of the OSI model, while north-south describes traffic between OSI model layers.East-west is switch-to-switch traffic, while north-south is switch-to-router traffic.East-west traffic stays within the datacenter, while north-south traffic does not.East-west is backbone traffic among switches and routers, while north-south is traffic to end systems, such as servers.
278 Top-of-rack switches most commonly form which layer of the datacenter topology?LeafBackboneSpineCore
279 Which of the following layers in a Software-Defined Network (SDN) architecture consists of hardware devices?ApplicationControlInfrastructureCore
280 In a Software Defined Network (SDN), as defined in the RFC 7426 specification, a plane is a set of resources related to a particular function. Which of the following is not one of the five planes defined in the SDN architecture?ForwardingOperationalControlManagementInfrastructureApplication
281 Ralph is designing the datacenter for his company's new branch office. He is considering various options, including building a new datacenter at the branch office facility, using a colocated datacenter, and creating a virtual datacenter using a public cloud provider. Which of the following statements about the differences between these options are true? (Choose all that apply.)A colocated datacenter would be less expensive to implement than a branch office or public cloud datacenter.In a branch office or colocated datacenter, Ralph's company would own the hardware.In all three datacenter options, the administrators in Ralph's company would be responsible for setting up and managing the hardware.In a branch office or colocated datacenter, Ralph's company would be responsible for all utility costs, including heating, cooling, and power.A public cloud datacenter would have greater physical security than the other two options.A public cloud datacenter is easier to expand than a colocated or branch office datacenter
282 Which of the following cloud service models enables you to perform a new installation of an operating system of your choice?IaaSPaaSSaaSDaaSAll of the above
283 When you contract with a provider to obtain email services for your company using their servers in the public cloud, which of the following service models are you using?IaaSPaaSSaaSDaaSNone of the above
284 Which of the following cloud service models provides the consumer with the most control over the cloud resources?IaaSPaaSSaaSDaaSIaaS, PaaS, SaaS, and DaaS all provide the same degree of control.
285 Alice has just created a new Windows Server 2016 virtual machine using remote controls provided by a cloud service provider on the Internet. Which of the following cloud architectures is she using? (Choose all that apply.)IaaSPaaSSaaSPublic cloudPrivate cloudHybrid cloudCommunity cloud
286 In which of the following cloud models can a single organization function as both the provider and the consumer of all cloud services?Public cloudPrivate cloudHybrid cloudAd hoc cloud
287 Ed is the overnight manager of his company's datacenter, and he is responsible for both private and public resources in the company's hybrid cloud. Due to a new TV commercial shown that night, the company's website experiences a massive upsurge in traffic. The web server farm on the private cloud is being overwhelmed, so Ed configures some virtual machines in the public cloud to take up the slack. Which of the following is a common term for what Ed has done?Cloud bustingCloud burstingCloud splittingCloud migrating
288 Microsoft's Outlook.com email service is an example of which of the following cloud service models?IaaSPaaSSaaSDaaSNone of the above
289 Which of the following statements about cloud delivery models is true?A public cloud is inherently insecure because anyone can access it.A private cloud consists of hardware that is all located in a single datacenter.A hybrid cloud enables administrators to migrate services between public and private resources.Public, private, and hybrid clouds all utilize the same hardware resources.
290 Ed has just created a new Windows application for his company, and he wants to deploy it in the public cloud. He is looking for a provider that will furnish his company with a fully installed and configured Windows server on which he can install and run his application. Which of the following service models is he seeking to use?IaaSPaaSSaaSDaaSNone of the above
291 Which of the following are valid advantages or disadvantages of multitenancy in a public cloud datacenter? (Choose all that apply.)Multitenancy presents a potential security risk because other tenants are utilizing the same hardware.Multitenancy reduces the cost of utilities and other overhead.Multitenancy introduces the possibility of competition for bandwidth with other tenants.Multitenancy separates tenants by assigning each one its own virtual machine.
292 Which of the following is not one of the advantages of Infrastructure as Code (IaC) deployment for cloud-based virtual machines?IaC provides rapid deployment of virtual machine configurations.IaC provides consistency in virtual machine configurations.IaC provides cost savings by automating the virtual machine configuration process.IaC provides increased security by encrypting the virtual machine configurationIaC provides elasticity and scalability by simplifying the virtual machine deployment process.
293 Ralph is designing a hybrid deployment for a corporate client that will require a connection between the client's private network and a public cloud provider. The client is concerned about this connection becoming a speed bottleneck at times of heavy user traffic. Which of the following options can Ralph offer the client that will best address this potential problem?Use a different ISP for the cloud connection.Use a VPN for the cloud connection.Use a cloud direct connection for the hybrid link.Use a leased line connection to the ISP
Chapter 2 Network Implementations
THE COMPTIA NETWORK+ EXAM N10-008 TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:
2.1 Compare and contrast various devices, their features, and their appropriate placement on the network.Networking devicesLayer 2 switchLayer 3 capable switchRouterHubAccess pointBridgeWireless LAN controllerLoad balancerProxy serverCable modemDSL modemRepeaterVoice gatewayMedia converterIntrusion prevention system (IPS)/intrusion detection system (IDS) deviceFirewallVPN headend Networked devicesVoice over Internet Protocol (VoIP) phonePrinterPhysical access control devicesCamerasHeating, ventilation, and air conditioning (HVAC) sensorsInternet