. A ______ is a combination load balancer and application server that is a server
placed between a firewall or router.
a) ABC
b) ACD
c) ADC
d) All of the mentioned

1 Answer

Answer :

ADC

Related questions

Description : A ______ is a combination load balancer and application server that is a server placed between a firewall or router. a) ABC b) ACD c) ADC d) All of the mentioned

Last Answer : ADC

Description : A ______ is a combination load balancer and application server that is a server placed between a firewall or router. a) ABC b) ACD c) ADC d) All of the mentioned

Last Answer : ADC

Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management

Last Answer : Load Balancing

Description : What is most commonly used for managing the resources for every virtual system? a) Load balancer b) Hypervisor c) Router d) Cloud

Last Answer : Hypervisor

Description : What is most commonly used for managing the resources for every virtual system? a) Load balancer b) Hypervisor c) Router d) Cloud

Last Answer : Hypervisor

Description : Which of the following is a more sophisticated load balancer? a) workload managers b) workspace managers c) rackserve managers d) all of the mentioned

Last Answer : workload managers

Description : Which of the following is a more sophisticated load balancer? a) workload managers b) workspace managers c) rackserve managers d) all of the mentioned

Last Answer : workload managers

Description : Which of the following is a more sophisticated load balancer? a) workload managers b) workspace managers c) rackserve managers d)All of the mentioned

Last Answer : workload managers

Description : What is used to logically assign and separate physical resources such as memory and CPU in a cloud computing model? A. bios B. a hypervisor C. a load balancer D. a blade chassis

Last Answer : a hypervisor

Description : .In computing, ________ improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. a) Virtual machine b) Virtual computing c) Virtual cloud d) Load balancer

Last Answer : Load balancer

Description : Point out the wrong statement. a) In theory, any application can run either completely or partially in the cloud b) The location of an application or service plays a fundamental role in how the ... unit, under the control of an integrated program CSE-R17.BLOGSPOT.COM d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Google App Engine lets you deploy the application and monitor it b) From the standpoint of the client, a cloud service provider is different than any other networked ... be brought to bear to solve mobile, desktop, and local server issues d) All of the mentioned

Last Answer : From the standpoint of the client, a cloud service provider is different than any other networked service

Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned

Last Answer : All of the mentioned

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router

Last Answer : 2 A multi-homed firewall

Description : ______ sizing is possible when the system load is cyclical or in some cases when there are predictable bursts or spikes in the load. a) Left b) Right c) Top d) All of the mentioned

Last Answer : Right

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : Let current `i=2A` be flowing in each part of a wire frame as shown in Fig. 1.138. The frame is a combination of two equilateral triangles ACD and CDE

Last Answer : Let current `i=2A` be flowing in each part of a wire frame as shown in Fig. 1.138. The frame is a combination of ... be A. 24 N B. zero C. 16 N D. 8 N

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1) Application layer Firewall 2) Packet Filtering Firewall 3) Router enhanced firewall 4) IP enabled firewall

Last Answer : 2) Packet Filtering Firewall

Description : Which of the following use routes with packet filtering rules to allow or deny access based on source address, destination address, or port number? 1 Application layer Firewall 2 Packet Filtering Firewall 3 Router enhanced firewall 4 IP enabled firewall

Last Answer : 2 Packet Filtering Firewall

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Last Answer : virtual appliances

Description : Point out the wrong statement. a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software b) High touch applications are best done on-premises c) The Google App Engine follows IaaS d) None of the mentioned

Last Answer : The Google App Engine follows IaaS

Description : Which of the following language is used to build a message server queue in twitter? a) Rubyb) Scala c) Java d) All of the mentioned

Last Answer : Scala

Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Which of the following will be the host operating system for Windows Server? a) VirtualLogix VLX b) Microsoft Hyper-V c) Xen d) All of the mentioned

Last Answer : ) Microsoft Hyper-V

Description : Point out the correct statement. a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services b) The RightScale user interface provides real-time measurements of individual server instances c) ... technology are highly configurable and can be run under batch control d) All of the mentioned

Last Answer : All of the mentioned

Description : Which of the following impose additional overhead on clients and offer faster transfer? a) Block storage b) File Storage c) File Server d) All of the mentioned

Last Answer : Block storage

Description : Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Last Answer : virtual appliances

Description : Point out the wrong statement. a) A cloud is defined as the combination of the infrastructure of a datacenter with the ability to provision hardware and software b) High touch applications are best done on- premises c) The Google App Engine follows IaaS d) None of the mentioned

Last Answer : The Google App Engine follows IaaS

Description : How many types of virtual private server instances are partitioned in an IaaS stack? a) One b) Two c) Three d) All of The Mentioned

Last Answer : Three

Description : Applications such as a Web server or database server that can run on a virtual machine image are referred to as ______________ a) virtual server b) virtual appliances c) machine imaging d) all of the mentioned

Last Answer : virtual appliances

Description : Which of the following impose additional overhead on clients and offer faster transfer? a) Block storage b) File Storage c) File Server d) All of the mentioned

Last Answer : Block storage

Description : Point out the wrong statement. a) Wolf Frameworks uses a C# engine and supports both Microsoft SQL Server and MySQL database b) Applications built in Wolf are 50-percent browser-based ... and multisource overlaid content c) Google applications are cloud-based applications d) None of the mentioned

Last Answer : Applications built in Wolf are 50-percent browser-based and support mashable and multisource overlaid content

Description : Which among the following is correct characteristics about proxy server: a) A proxy server may act as a firewall by responding to input packets in the manner of an application while blocking other packets. b) A ... as a proxy on behalf of the network user; d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which of the following systems run an application layer firewall using proxy software? 1) Proxy NAT 2) Proxy client 3) Client 32 4) Proxy server

Last Answer : 4) Proxy server

Description : Which of the following systems run an application layer firewall using proxy software? 1 Proxy NAT 2 Proxy client 3 Client 32 4 Proxy server

Last Answer : 4 Proxy server

Description : ABC and ADC are two right triangles with common hypotenuse AC. Prove that angle CAD = angle CAB -Maths 9th

Last Answer : Given, AC is the common hypotenuse. ∠B = ∠D = 90°. To prove, ∠CAD = ∠CBD Proof: Since, ∠ABC and ∠ADC are 90°. These angles are in the semi circle. Thus, both the triangles are lying in the semi ... D are concyclic. Thus, CD is the chord. ⇒ ∠CAD = ∠CBD (Angles in the same segment of the circle)

Description : ABC and ADC are two right triangles with common hypotenuse AC. Prove that angle CAD = angle CAB -Maths 9th

Last Answer : Given, AC is the common hypotenuse. ∠B = ∠D = 90°. To prove, ∠CAD = ∠CBD Proof: Since, ∠ABC and ∠ADC are 90°. These angles are in the semi circle. Thus, both the triangles are lying in the semi ... D are concyclic. Thus, CD is the chord. ⇒ ∠CAD = ∠CBD (Angles in the same segment of the circle)

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : Which statement best describes the relationship between application, server, and client in a multitenancy environment? A. Single instance of software running on a server and serves one client. B ... clients. D. Multiple instances of software running on multiple servers and serves one client.

Last Answer : Single instance of software running on a server and serves multiple clients.

Description : Who provide GUI (Graphical User Interface) to interact with the cloud? A. Client B. Application C. Client Infrastructure D. Server

Last Answer : Client Infrastructure

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : The most commonly used set of protocols uses ______ as the messaging format. a) XML b) JSON c) BSON d) All of the mentioned

Last Answer : XML

Description : Cloud computing is also a good option when the cost of infrastructure and management is ______ a) low b) high c) moderate d) none of the mentioned

Last Answer : high

Description : Network bottlenecks occur when ______ data sets must be transferred. a) large b) small c) big d) all of the mentioned

Last Answer : large

Description : An operating system running on a Type ______ VM is full virtualization. a) 1 b) 2 c) 3 d) All of the mentioned

Last Answer : 1