Chapter 10 Review Questions Flashcards
Which of the following is an advantage to virtualizing many servers in your datacenter, compared to running each server on a separate physical machine?
a. Virtualization will improve the servers’ performance.
b. Virtualization will conserve resources.
c. Virtualization will make administration easier.
d. Virtualization will save software costs.
Virtualization will conserve resources.
Which of the following applies to virtual machines, no matter what type of virtualization software they are created with?
a. They can only belong to one VLAN.
b. They cannot be addressed by clients on a physical LAN.
c. They cannot be assigned Internet-routable IP addresses.
d. They exist as files on the hard drive of their host.
They exist as files on the hard drive of their host.
You have created a virtual machine on your workstation so that you can test some new
applications. You configured the VM’s hard disk space to be dynamically allocated.
Which of the following will allocate more space for the VM when it needs it?
a. Virtual switch
b. Virtual adapter
c. Hypervisor
d. Virtual network manager
Hypervisor
You are running KVM on a Fedora Linux computer and have configured a virtual
server to use the bridged networking type. The IP address of your host machine’s NIC is
192.168.25.71. Assuming your physical LAN uses DHCP, which of the following
addresses is most likely the one assigned to your virtual server?
a. 192.168.25.1
b. 192.168.25.83
c. 192.168.0.0
d. Not enough information to draw a conclusion
192.168.25.83
Which of the following is the default networking type assigned to vNICs in most
virtualization programs?
a. Host-only
b. Grouped
c. NAT
d. Bridged
NAT
You have decided to create four virtual Web servers on a Windows Server 2008 R2
server using Hyper-V R2. Which of the following configuration options would you use
to make sure the Web servers are accessible to users across the Internet?
a. Private virtual network
b. Host virtual network
c. External virtual network
d. Internal virtual network
External virtual network
You work second shift and share a desktop workstation with your colleagues who work
on the first and third shifts. Each of you has a separate virtual machine on the
workstation. When your third-shift coworker installs a new program on his VM, it
causes the virtual machine’s operating system to stop working. What happens as a
consequence?
a. Your VM’s operating system stops working.
b. The host machine’s operating system stops working.
c. Your VM and the host machine work as usual, but performance of all the VMs is
compromised.
d. Nothing changes for your VM.
Nothing changes for your VM.
Each of the VMs on your host computer is configured to use the NAT networking
type. They can still pick up e-mail and surf the Web. How are they getting their
IP addresses?
a. From the host machine’s virtualization software
b. From the DHCP server on the physical network
c. From the router on the physical network
d. From another VM on the host machine that’s configured to act as a DHCP
From the host machine’s virtualization software
Which of the following network configuration types is best used for a company’s e-mail
server?
a. Host-only
b. Bridged
c. NAT
d. Grouped
Bridged
Which of the following network configuration types prevents VMs from exchanging
traffic with nodes other than the workstation they are installed on?
a. Host-only
b. Bridged
c. NAT
d. Grouped
Host-only
You manage a data center for a large ISP that hosts virtual Web and mail servers for
many customers. One of your physical servers has four NICs and hosts four mail
servers. How many vNICs can you assign to each of the mail servers?
a. 1
b. 2
c. 4
d. It depends on the virtualization software.
It depends on the virtualization software.
Because of the functions it performs, each port on a virtual switch can also be
considered a _______.
a. Virtual machine
b. Virtual bridge
c. Virtual router
d. Virtual firewall
Virtual bridge
You have created multiple virtual machines on your workstation to test different unified
communications programs. You want these machines to be available to your IT
colleagues for testing, but you do not want the traffic generated by their use to interfere
with routine business LAN traffic. Meanwhile, on another workstation a coworker has
installed additional communications programs for review. You decide to create a new
VLAN devoted to software evaluation. Where do you add your coworker’s virtual
machines to the new VLAN?
a. On your host workstation, where you established the new VLAN
b. On the LAN switch, which manages the VLAN
c. On your friend’s host workstation, where the virtual machin
On your friend’s host workstation, where the virtual machines reside
How must a physical NIC be configured so that it can connect its host’s VMs to
multiple VLANs?
a. As a trunk
b. As a port group
c. As a channel
d. As a team
As a trunk
To complete its VPN connection, your computer is using RDP. Which of the following
VPN types are you participating in?
a. Site-to-link
b. Site-to-site
c. Link-to-client
d. Client-to-site
Client-to-site