Chapter 7: Virtual Machines Flashcards

1
Q

A vSwitch (virtual switch) or bridge operates at which layer of the OSI model?
Layer 7
Layer 4
Layer 1
Layer 2

A

A: Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

Parallels
VMware vSphere
Citrix Xen
Oracle VirtualBox

A

Citrix Xen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?

NAT mode
lockdown mode
host-only mode
bridged mode

A

NAT mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a software-defined network, what is responsible for controlling the flow of data?

flow director
SDN controller
SDN switch
vRouter

A

SDN controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Regarding VNC (Virtual Network Computing), what statement is accurate?

VNC is open source, allowing companies to develop their own software based on VNC.

VNC uses the Remote Desktop Protocol (RDP).

VNC is a standard developed by Microsoft and used by Windows Remote Desktop.

VNC is faster than Remote Desktop, and requires less network bandwidth.

A

VNC is open source, allowing companies to develop their own software based on VNC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

priority
FCS
FEC
encryption

A

FCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The use of certificate authorities to associate public keys with certain users is known by what term?

public-key infrastructure

symmetric identification

public-key organization

certified infrastructure

A

public-key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VMware Player and Linux KVM are both examples of what type of hypervisor?

barebones hypervisor

Type 1 hypervisor

bare-metal hypervisor

Type 2 hypervisor

A

Type 2 hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is NOT a potential disadvantage of utilizing virtualization?

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

Multiple virtual machines contending for finite resources can compromise performance.

Increased complexity and administrative burden can result from the use of virtual machines.

Licensing costs can be high due to every instance of commercial software requiring a separate license.

A

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

Generic Routing Encapsulation (GRE)
OpenVPN
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)

A

OpenVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

Symmetric VPN Autodial
Dynamic Multipoint VPN
Auto Switched VPN Service
Dynamic SmartVPN

A

Dynamic Multipoint VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

SSH supports port forwarding.

SSH does not protect against DNS spoofing.

SSH does not protect against IP spoofing.

SSH provides a graphical view of the remote computer.

A

SSH supports port forwarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

An organization needs to have a hosted virtual network infrastructure for their services, which are run on virtual machines.

An organization wishes to gain access to applications through an online user interface, while maintaining compatibility across operating systems.

A small organization needs to have high availability for their web server.

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

A

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When is it appropriate to utilize the NAT network connection type?

Only when the VM requires an IP address on the physical LAN.

Only if the VM is intended for VM-to-host communications.

Whenever the VM does not need to be access at a known address by other network nodes.

Only if the VM does not need to communicate with the host PC.

A

Whenever the VM does not need to be access at a known address by other network nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?

In the /var/run/ssh/public folder.

In the /etc/ssh/keys folder.

In an authorization file under your home directory on your computer.

In an authorization file on the host where the SSH server is.

A

In an authorization file on the host where the SSH server is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
FTP Secure (FTPS)
File Transfer Protocol (FTP)
Trivial FTP (TFTP)
Secure FTP (SFTP)

A

Trivial FTP (TFTP)

17
Q

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?

PPP can support several Network layer protocols, such as IP, that might use the connection.

PPP can utilize an authentication protocol, such as MS-CHAPv2 or EAP to authenticate a client.

PPP can negotiate and establish a connection between two endpoints.

PPP can support strong encryption, such as AH or ESP.

A

PPP can support strong encryption, such as AH or ESP.

18
Q

Which of the following virtualization products is an example of a bare-metal hypervisor?

VirtualBox
VMware Player
Linux KVM
Citrix XenServer

A

Citrix XenServer

19
Q

Which statement regarding the use of a bridged mode vNIC is accurate?

The vNIC will its own IP address on the physical LAN.

The vNIC will only be able to communicate across the bridge to the host PC.

The vNIC will be assigned a NAT-ed IP address.

The vNIC will utilize the host PC’s IP address.

A

The vNIC will its own IP address on the physical LAN.

20
Q

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
XaaS
PaaS
IaaS
SaaS

A

IaaS