Information Technology Reference
In-Depth Information
6. Layer 4 security and application services including server load balancing, Secure
Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS)
services are provided by the data center ___________ layer?
a.
Access
b.
Routed
c.
Core
d.
Aggregation
7.
Virtualization technologies allow a _________ device to share its resources by acting
as multiple versions of itself?
a.
Software
b.
Virtual
c.
Logical
d.
Physical
8. Which of the following are examples of logical isolation techniques in which network
segments share the same physical infrastructure? (Select all that apply.)
a.
VRF
b.
VLAN
c.
VSAN
d.
VSS
9. Which of the following are examples of technologies that employ device virtualiza-
tion or the use of contexts? (Select all that apply.)
a.
VRF
b.
ASA
c.
VLAN
d.
ACE
10. What involves the creation of independent logical network paths over a shared net-
work infrastructure?
a.
Access control
b.
Services edge
c.
Path isolation
d.
Device context
Search WWH ::




Custom Search