Which of the following is the MOST dangerous type of threat when using virtualization? VM sprawl Rogue Rogue VM VM escape Virtual NIC duplication Correct Answer : VM escape Overall explanation: VM escape refers to malware running on a guest OS jumping to another guest or the host. As with any other software type, it is vital to keep the hypervisor code up-to-date with patches for critical vulnerabilities. VM escape is the biggest threat to virtualized systems. A virtual network interface card (vNIC) represents the configuration of a VM connected…
Author: Mohana Ramaswamy
Virtualization and Cloud Computing
What type of cloud model would allow the sharing of resources by multiple organizations to create a service that benefits all of its members? 1) Private Cloud 2) Community Cloud 3) Hybrid Cloud 4) Public Cloud Correct Answer : Community Cloud Overall explanation : A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns, whether managed internally or by a third party and hosted internally or externally. Community Cloud is a hybrid form of private cloud.…
Networking
You are configuring a new client workstation on the network. Which type of IP address should you configure it with? 1) Dynamic 2) Static 3) Link-local 4) APIPA Correct Answer : Dynamic Overall explanation: A dynamic IP address should be used for client workstations and devices to ensure they are easy to configure and less prone to human error. When configuring a dynamic IP address, the DHCP server should issue the IP address, subnet mask, gateway, and DNS server’s IP address to the workstation or device. A static IP address…
Mobile Devices
Which of the following synchronization methods does NOT work with Android devices? Google Workspace Flickr iTunes Office 365 Correct Answer : iTunes Overall explanation : Android can not use iTunes to perform synchronization functions. The iTunes application only works with Apple devices, such as iPhones and iPads. Android devices can use Google Workspace with Gmail to sync emails and contacts. Android devices can also use Office 365 to sync emails, contacts, and other files if you are a Microsoft subscriber. Android devices can use Flickr to sync photos. Mohana Ramaswamy
Networking
You work for the city’s Department of Motor Vehicles (DMV). There are five DMV locations spread out across the city that you have been asked to connect with a network. You have created a list of requirements for this network, including that it must be wired and support at least 1 Gbps of bandwidth. Which of the following network types would MOST likely be used for the DMV to connect their internal networks across the city securely? PAN WAN MAN LAN Answer : MAN Overall explanation : A metropolitan area…
Virtualization and Cloud Computing
Which of the following virtualization concepts refers to a VM’s ability to have memory allocated for its use? a) Measured service b) Synchronization c) Resource pooling d) Virtual application streaming Answer : Resource pooling Overall Explanation : Resource pooling refers to the concept that allows a virtual environment to allocate memory and processing capacity for a VMs use. Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective…
Hardware and Network Troubleshooting
Rootfloe Company has recently purchased a new wireless printer and has asked you to configure it in their office. You have installed the necessary printer drivers on your workstation and have plugged the printer into the power outlet. You just configured the printer to connect to the guest wireless network. Next, you try to print a test page, but nothing prints out. Which of the following is the most likely cause for the printer not printing the test page? 1) You connected the printer to the guest wireless network instead…
Networking
You just heard of a new ransomware attack that has been rapidly spreading across the internet that takes advantage of a vulnerability in the Windows SMB protocol. To protect your network until Microsoft releases a security update, you want to block the port for SMB at your firewall to prevent becoming a victim of this attack. Which of the following ports should you add to your blocklist? a) 514 b) 143 c) 123 d) 445 Answer : 445 Overall Explanation : Server Message Block (SMB) uses ports 139 and 445,…
