Chapter 10 Quiz Flashcards

1
Q

Using a virtualization program, you can create dozens of different VMs.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The software required to establish VPNs is usually expensive.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PPTP and L2TP are the only protocols that can be used to carry VPN traffic.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The physical computer on a virtual machine is known as a ____.
guest
client
host
server

A

host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Each VM is known as a ____.
guest
host
client
node

A

guest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

____ is the most widely implemented virtualization software today.
Hyper-V
Citrix
VirtualBox
VMware

A

VMware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To connect to a network, a virtual machine requires a ____.
virtual switch
virtual adapter
physical switch
virtual MAC address

A

virtual adapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Upon creation, each vNIC is automatically assigned a ____.
MAC address
switch address
block address
reference address

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

____ connect vNICs with a network, whether virtual or physical.
Virtual routers
Virtual crossovers
Virtual duplexers
Virtual bridges

A

Virtual bridges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.
guest machine
reference machine
host machine
management machine

A

host machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host’s operating system.
Host-only
NAT
Bridged
Blocked

A

Host-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ refers to dialing directly into a private network’s or ISP’s remote access server to log on to a network.
Dialed networking
Traditional networking
Dial-up networking
Virtual networking

A

Dial-up networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a server compares a user’s credentials with those in its database, the process is known as ____.
authorization
authentication
administration
accounting

A

authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the case of dial-up networking, the term ____ refers to a modem.
serial connection
virtual connection
physical connection
POTS connection

A

serial connection

17
Q

A ____ uses very little hard disk space or processing power from the workstation on which it is installed.
thick client
fat client
thin client
virtual client

A

thin client

18
Q

____ is the remote virtual computing software that comes with Windows client and server operating systems.
Remote Server
Remote Client
Remote Windows
Remote Desktop

A

Remote Desktop

19
Q

____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
Remote Desktop
VNC
Citrix
Xen

A

VNC

20
Q

____ are wide area networks that are logically defined over public transmission systems.
VPNs
Leased lines
Private lines
Dial-up lines

A

VPNs

21
Q

VPNs can be classified based on the kinds of ____ they connect.
hardware
software
endpoints
circuits

A

endpoints

22
Q

In a ____ VPN, tunnels connect multiple sites on a WAN.
site-to-site
site-to-client
client-to-client
link-to-line

A

site-to-site

23
Q

A VPN tunneling protocol operates at the ____ layer.
Network
Application
Session
Data Link

A

Data Link

24
Q

On network diagrams, the Internet is frequently depicted as a ____.
block
cloud
line
lightening bolt

A

cloud

25
Q

In ____, each datagram can follow one of many paths to reach its destination.
circuit switching
line switching
packet switching
data switching

A

packet switching

26
Q

____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.
Virtual
Physical
Material
Guest

A

Virtual