Chapter 9 Flashcards
You have a development machine that contains sensitive information relative to your business. You are concerned that spyware and malware might be installed while users browse websites, which could compromise your system or pose a confidentiality risk.
Which of the following actions would BEST protect your system?
Run the browser in protected mode.
Change the security level for the internet zone to High.
Run the browser within a virtual environment.
Configure the browser to block all cookies and pop-ups.
Run the browser within a virtual environment.
Which of the following is an advantage of a virtual browser?
Prevents adware and spyware that monitor your internet activity
Prevents phishing and drive-by downloads
Protects the host operating system from malicious downloads
Filters internet content based on ratings
Protects the host operating system from malicious downloads
Which of the following is an exploit in which malware allows the virtual OS to interact directly with the hypervisor?
Load balancing
Bottleneck
Escape
Jump
Escape
Which of the following devices is computer software, firmware, or hardware that creates and runs virtual machines?
Virtual switch
Hypervisor
Virtual router
Virtual firewall
Hypervisor
Which of the following is a technique that disperses a workload between two or more computers or resources to achieve optimal resource utilization, throughput, or response time?
Hypervisor
Bottleneck
Virtualization
Load balancing
Load balancing
What is isolating a virtual machine from the physical network to allow testing to be performed without impacting the production environment called?
Workload balancing
Resource pooling
Testing
Sandboxing
Sandboxing
Which of the following are disadvantages of server virtualization?
A compromised host system might affect multiple servers.
Systems are isolated from each other and cannot interact with other systems.
A compromised guest system might affect multiple servers.
It increases hardware costs.
A compromised host system might affect multiple servers.
Which type of hypervisor runs as an application on the host machine?
Type 4
Type 3
Type 1
Type 2
Type 2
Which of the following are advantages of virtualization? (Select two.)
Redundancy of hardware components for fault tolerance
Reduced utilization of hardware resources
Improved host-based attack detection
Easy migration of systems to different hardware
Centralized administration
Easy migration of systems to different hardware
Centralized administration
Which load balancing method distributes a workload across multiple computers?
Virtualization
Bottleneck
Workload balancing
Resource pooling
Workload balancing
Which of the following provides the network virtualization solution called XenServer?
VMWare
Citrix
Microsoft
Cisco
Citrix
Which of the following is a network virtualization solution provided by Microsoft?
Hyper-V
Citrix
VMware
VirtualBox
Hyper-V
What is the limit of virtual machines that can be connected to a virtual network?
65,534
16,777,214
Unlimited
54
Unlimited
You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating systems’ versions and editions.
Currently, all of your virtual machines used for testing are connected to the production network through the hypervisor’s network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code.
To prevent issues, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other.
What should you do? (Select two. Both responses are part of the complete solution.)
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Disable the switch port the hypervisor’s network interface is connected to.
Create a new virtual switch configured for bridged (external) networking.
Create MAC address filters on the network switch that block each virtual machine’s virtual network interfaces.
Create a new virtual switch configured for host-only (internal) networking.
Disconnect the network cable from the hypervisor’s network interface.
Connect the virtual network interfaces in the virtual machines to the virtual switch.
Create a new virtual switch configured for host-only (internal) networking.
Which of the following statements about virtual networks is true? (Select two.)
A virtual network is dependent on the configuration and physical hardware of the host operating system.
Accessing network resources requires that the operating system on the virtual machine be configured on an isolated network.
Each virtual network must be associated with a single physical network adapter.
Multiple virtual networks can be associated with a single physical network adapter.
A virtual network is independent of the configuration and physical hardware of the host operating system.
A virtual network is dependent on the configuration and physical hardware of the host operating system.
Multiple virtual networks can be associated with a single physical network adapter.
Which of the following devices facilitates communication between different virtual machines by checking data packets before moving them to a destination?
Virtual firewall
Hypervisor
Virtual switch
Virtual router
Virtual switch
What is a virtual LAN that runs on top of a physical LAN called?
VMM
VAN
VFA
VLAN
VAN
Which of the following virtual devices provides packet filtering and monitoring?
VLAN
VMM
vSwitch
VFA
VFA
Which of the following is an example of protocol-based network virtualization?
VLAN
vSwitch
VFA
VMM
VLAN
Which of the following is used as a secure tunnel to connect two networks?
VLAN
VAN
VPN
VFA
VPN
Which of the following is an advantage of software-defined networking (SDN)?
More granular control
Is currently a new technology
Lack of vendor support
Standards are still being developed
More granular control
Which of the following BEST describes the Application SDN layer?
Is software that is able to inventory hardware components in the network.
Communicates with the Control layer through the southbound interface.
Receives its requests and then provides configuration and instructions.
Communicates with the Control layer through the northbound interface.
Communicates with the Control layer through the northbound interface.
Which SDN layer would a load balancer that stops and starts VMs as resource use increases reside on?
Session
Application
Physical
Control
Application
Software defined networking (SDN) uses a controller to manage devices. The controller is able to inventory hardware components on the network, gather network statistics, make routing decisions based on gathered data, and facilitate communication between devices from different vendors. It can also be used to make widespread configuration changes on just one device.
Which of the following best describes an SDN controller?
The SDN controller is a networking protocol.
The SDN controller is hardware.
The SDN controller is a virtual networking device.
The SDN controller is software.
The SDN controller is software.
This layer receives its requests from the Application layer.
Application
Control
Physical
Control
This layer is also known as the Infrastructure layer.
Application
Control
Physical
Physical
This layer communicates with the Control layer through what is called the northbound interface.
Application
Control
Physical
Application
This layer provides the Physical layer with configuration and instructions.
Application
Control
Physical
Control
On this layer, individual networking devices use southbound APIs to communicate with the control plane.
Application
Control
Physical
Physical
Which of the following does the Application layer use to communicate with the Control layer?
Controllers
Northbound APIs
Southbound APIs
These layers do not communicate
Northbound APIs
Which of the following BEST describes the Physical SDN layer?
Receives its requests from the Application layer.
Also known as the Infrastructure layer.
Sometimes called northbound APIs.
Gives new life to old networking hardware.
Also known as the Infrastructure layer.
Network engineers have the option of using software to configure and control the network rather than relying on individual static configuration files that are located on each network device.
Which of the following is a relatively new technology that allows network and security professionals to use software to manage, control, and make changes to a network?
Load balancing software
Control layer networking
Software-defined networking (SDN)
Infrastructure software networking
Software-defined networking (SDN)
Which APIs do individual networking devices use to communicate with the control plane from the Physical layer?
None
Northbound
Northbound and Southbound
Southbound
Southbound
Which of the following is a disadvantage of software defined networking (SDN)?
SDN facilitates communication between hardware from different vendors.
SDN gathers network information and statistics.
SDN standards are still being developed.
SDN creates centralized management.
SDN standards are still being developed.
Provides cloud services to just about anyone.
Public Cloud
Provides cloud services to a single organization
Private Cloud
Allows cloud services to be shared by several organizations.
Community Cloud
Integrates one cloud service with other cloud services.
Hybrid Cloud