Chapter 7: Virtual Machines Flashcards
A vSwitch (virtual switch) or bridge operates at which layer of the OSI model?
Layer 7
Layer 4
Layer 1
Layer 2
A: Layer 2
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
Parallels
VMware vSphere
Citrix Xen
Oracle VirtualBox
Citrix Xen
By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?
NAT mode
lockdown mode
host-only mode
bridged mode
NAT mode
In a software-defined network, what is responsible for controlling the flow of data?
flow director
SDN controller
SDN switch
vRouter
SDN controller
Regarding VNC (Virtual Network Computing), what statement is accurate?
VNC is open source, allowing companies to develop their own software based on VNC.
VNC uses the Remote Desktop Protocol (RDP).
VNC is a standard developed by Microsoft and used by Windows Remote Desktop.
VNC is faster than Remote Desktop, and requires less network bandwidth.
VNC is open source, allowing companies to develop their own software based on VNC.
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
priority
FCS
FEC
encryption
FCS
The use of certificate authorities to associate public keys with certain users is known by what term?
public-key infrastructure
symmetric identification
public-key organization
certified infrastructure
public-key infrastructure
VMware Player and Linux KVM are both examples of what type of hypervisor?
barebones hypervisor
Type 1 hypervisor
bare-metal hypervisor
Type 2 hypervisor
Type 2 hypervisor
What is NOT a potential disadvantage of utilizing virtualization?
Virtualization software increases the complexity of backups, making creation of usable backups difficult.
Multiple virtual machines contending for finite resources can compromise performance.
Increased complexity and administrative burden can result from the use of virtual machines.
Licensing costs can be high due to every instance of commercial software requiring a separate license.
Virtualization software increases the complexity of backups, making creation of usable backups difficult.
What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?
Generic Routing Encapsulation (GRE)
OpenVPN
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
OpenVPN
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?
Symmetric VPN Autodial
Dynamic Multipoint VPN
Auto Switched VPN Service
Dynamic SmartVPN
Dynamic Multipoint VPN
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
SSH supports port forwarding.
SSH does not protect against DNS spoofing.
SSH does not protect against IP spoofing.
SSH provides a graphical view of the remote computer.
SSH supports port forwarding.
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?
An organization needs to have a hosted virtual network infrastructure for their services, which are run on virtual machines.
An organization wishes to gain access to applications through an online user interface, while maintaining compatibility across operating systems.
A small organization needs to have high availability for their web server.
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
When is it appropriate to utilize the NAT network connection type?
Only when the VM requires an IP address on the physical LAN.
Only if the VM is intended for VM-to-host communications.
Whenever the VM does not need to be access at a known address by other network nodes.
Only if the VM does not need to communicate with the host PC.
Whenever the VM does not need to be access at a known address by other network nodes.
When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?
In the /var/run/ssh/public folder.
In the /etc/ssh/keys folder.
In an authorization file under your home directory on your computer.
In an authorization file on the host where the SSH server is.
In an authorization file on the host where the SSH server is.