Chapter 10 Quiz Flashcards
Using a virtualization program, you can create dozens of different VMs.
True
False
True
A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
True
False
False
The software required to establish VPNs is usually expensive.
True
False
False
PPTP and L2TP are the only protocols that can be used to carry VPN traffic.
True
False
False
Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
True
False
True
The physical computer on a virtual machine is known as a ____.
guest
client
host
server
host
Each VM is known as a ____.
guest
host
client
node
guest
____ is the most widely implemented virtualization software today.
Hyper-V
Citrix
VirtualBox
VMware
VMware
To connect to a network, a virtual machine requires a ____.
virtual switch
virtual adapter
physical switch
virtual MAC address
virtual adapter
Upon creation, each vNIC is automatically assigned a ____.
MAC address
switch address
block address
reference address
MAC address
____ connect vNICs with a network, whether virtual or physical.
Virtual routers
Virtual crossovers
Virtual duplexers
Virtual bridges
Virtual bridges
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.
guest machine
reference machine
host machine
management machine
host machine
____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host’s operating system.
Host-only
NAT
Bridged
Blocked
Host-only
____ refers to dialing directly into a private network’s or ISP’s remote access server to log on to a network.
Dialed networking
Traditional networking
Dial-up networking
Virtual networking
Dial-up networking
When a server compares a user’s credentials with those in its database, the process is known as ____.
authorization
authentication
administration
accounting
authentication
In the case of dial-up networking, the term ____ refers to a modem.
serial connection
virtual connection
physical connection
POTS connection
serial connection
A ____ uses very little hard disk space or processing power from the workstation on which it is installed.
thick client
fat client
thin client
virtual client
thin client
____ is the remote virtual computing software that comes with Windows client and server operating systems.
Remote Server
Remote Client
Remote Windows
Remote Desktop
Remote Desktop
____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
Remote Desktop
VNC
Citrix
Xen
VNC
____ are wide area networks that are logically defined over public transmission systems.
VPNs
Leased lines
Private lines
Dial-up lines
VPNs
VPNs can be classified based on the kinds of ____ they connect.
hardware
software
endpoints
circuits
endpoints
In a ____ VPN, tunnels connect multiple sites on a WAN.
site-to-site
site-to-client
client-to-client
link-to-line
site-to-site
A VPN tunneling protocol operates at the ____ layer.
Network
Application
Session
Data Link
Data Link
On network diagrams, the Internet is frequently depicted as a ____.
block
cloud
line
lightening bolt
cloud
In ____, each datagram can follow one of many paths to reach its destination.
circuit switching
line switching
packet switching
data switching
packet switching
____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.
Virtual
Physical
Material
Guest
Virtual