Mention what are the networking options used in OpenStack
a. Flat Network Manager: IP addresses for VM instances are fetched
from the subnet, and then injected into the image on launch
b. Flat DHCP Network Manager: IP addresses for VM instances are
fetched from the subnet specified by the network administrator
c. VLAN Network Manager: Compute creates a VLAN and bridge;
DHCP server is started for each VLAN to pass out IP addresses to
VM instances.
d. All of the above

1 Answer

Answer :

All of the above

Related questions

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Which component serves as a dashboard for users to manage OpenStack compute, storage and networking services? a) Designate b) Horizon c) Glance d) Searchlight

Last Answer : Horizon

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router

Last Answer : 2 A multi-homed firewall

Description : What are all the modular architecture for OpenStack are: a) OpenStack Compute: For overseeing extensive systems of the virtual machine. b) OpenStack Object Storage: The storage framework that offers help for both object storage ... to virtual disk pictures. d) A & B e) B & C f) All of the above

Last Answer : All of the above

Description : What are all the modular architecture for OpenStack are: a) OpenStack Compute: For overseeing extensive systems of the virtual machine. b) OpenStack Object Storage: The storage framework that offers help for both object storage ... to virtual disk pictures. d) A & B e) B & C f) All of the above

Last Answer : All of the above

Description : The gateway administrator provides the _________ template information when the infrastructure is set up. a) Cloud b) HDFS c) better d) VM

Last Answer : VM

Description : VLANs and IP addresses resources are made available to end user via? A. Server virtualization. B. Client virtualization. C. End-user virtualization. D. IaaS

Last Answer : Server virtualization

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : __________ allows multiple operating system instances to run as guest on the same server. A. Server. B. Hypervisor. C. Network. D. Data.

Last Answer : Hypervisor.

Description : Which of the following allows you to create instances of the MySQL database to support your Web sites? a) Amazon Elastic Compute Cloud b) Amazon Simple Queue Service c) Amazon Relational Database Service d) Amazon Simple Storage System

Last Answer : Amazon Relational Database Service

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the below mentioned protocols provides a mechanism of acquiring an IP address without manual intervention in addition to plug and play type of networking? a. BOOTP b. DHCP c. Both a & b d. None of the above

Last Answer : b. DHCP

Description : Point out the correct statement. a) Eucalyptus and Rackspace both use Amazon EC2 and S3 services b) The RightScale user interface provides real-time measurements of individual server instances c) ... technology are highly configurable and can be run under batch control d) All of the mentioned

Last Answer : All of the mentioned

Description : Which statement best describes the relationship between application, server, and client in a multitenancy environment? A. Single instance of software running on a server and serves one client. B ... clients. D. Multiple instances of software running on multiple servers and serves one client.

Last Answer : Single instance of software running on a server and serves multiple clients.

Description : How many types of virtual private server instances are partitioned in an IaaS stack? A. 2 B. 3 C. 4 D. 5

Last Answer : 3

Description : How many types of virtual private server instances are partitioned in an IaaS stack? a) One b) Two c) Three d) All of The Mentioned

Last Answer : Three

Description : What are two common concerns in a cloud environment? (Choose two.) A. Inability to use proxy servers and load balancers. B. Not enough computing capacity during peak usage times. C. Illegal access ... same physical ethernet, they should not be able to read or modify each other's network traffic.

Last Answer : Illegal access to private data stored by applications in the cloud.If two guest instances are running on the same host or on different hosts connected to the same physical ethernet, they should not be able to read or modify each other's network traffic

Description : ____________ is a firmware that acts as a Virtual Machine Manager. A. Hypervisor B. Network C. Server D. Storage

Last Answer : Hypervisor

Description : What cangreatly reduce TCP/IP configuration problems? A. WINS Server B. WINS Proxy C. DHCP Server D. PDC E. None of the above

Last Answer : DHCP Server

Description : Which OpenStack component provides database as a service? a) Trove b) Manila c) Storlets d) Kuryr

Last Answer : Trove

Description : Which three OpenStack components does Nova need to function? a) Neutron, Horizon and Glance b) Glance, Keystone and Horizon c) Keystone, Glance and Neutron d) Cinder, Swift and Kolla

Last Answer : Keystone, Glance and Neutron

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : …………………………………. converts a physical network address into an IP address. A. ARP B. RARP C. DNS D. DHCP

Last Answer : B. RARP

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) A client can request access to a cloud service from any location b) A cloud has multiple application instances and directs requests to an instance based on ... a set of virtual machines with each machine being assigned a workload d) All of the mentioned

Last Answer : All of the mentioned

Description : A hardened firewall host on an intranet (i) has a proxy application gateway program running on it (ii)Allows specified internet users to access specified services in the intranet (iii) Initiates all internet activities requested by clients ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : c. i, ii, iii, iv 

Description : Proxy application gateway (i) acts on behalf of all intranet users wanting to access interne securely (ii)monitors all accesses to internet and allows access to only specified IP addresses (iii) disallows use of certain protocols with ... ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii 

Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252

Last Answer : 255.255.252.0

Description : Point out the correct statement. a) A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on b) Virtual machines provide the ... that having resources indirectly addressed means there is some level of overhead d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. A. myYearbook is used for general social network B. MySpace is used as a social networking site for Asian relationships C. Livemocha is used for language learning purpose D. None of the above

Last Answer : MySpace is used as a social networking site for Asian relationships

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement : A. Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through ... A process virtual machine instantiates when a command begins a process D. All of the above

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement. a) Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware ... A process virtual machine instantiates when a command begins a process d) All of the mentioned

Last Answer : Full virtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM

Description : Point out the wrong statement. a) Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM b) All CPUs support virtual machines c) On a Type 2 VM, ... is created that emulates the devices with which a system would normally interact d) All of the mentioned

Last Answer : All CPUs support virtual machines

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : _________ is a service that creates and manages virtual network interfaces. a) VMware vStorage b) VMware vNetwork c) VMware vCompute d) Application services

Last Answer : VMware vNetwork

Description : Which of the following benefit is related to creates resources that are pooled together in a system that supports multi-tenant usage? a) On-demand self-service b) Broad network access c) Resource pooling d) All of the mentioned

Last Answer : On-demand self-service

Description : Which of the following is not a function hypervisor management software? A. Create VM. B. Store VM. C. Delete VM. D. Move VM.

Last Answer : Store VM.

Description : In which issue, It is challenging to migrate an application, which is resource-intensive to cloud and to execute it via Virtual Machine? A. Architectural Issues B. Security and Privacy C. Mobile Communication Congestion D. Live VM Migration

Last Answer : Live VM Migration

Description : An operating system running on a Type ______ VM is full virtualization. A. 1 B. 2 C. 3 D. 4

Last Answer : 1

Description : Which of the following should be placed in second lowermost layer for the following figure?a) Host Operating System b) Software c) VM d) None of the mentioned

Last Answer : Host Operating System

Description : Which of the following is Type 2 VM? a) VirtualLogix VLX b) VMware ESX c) Xen d) LynxSecure

Last Answer : Xen

Description : An operating system running on a Type ______ VM is full virtualization. a) 1 b) 2 c) 3 d) All of the mentioned

Last Answer : 1