Chapter 10 Review Questions Flashcards

1
Q

Which of the following is an advantage to virtualizing many servers in your datacenter, compared to running each server on a separate physical machine?
a. Virtualization will improve the servers’ performance.
b. Virtualization will conserve resources.
c. Virtualization will make administration easier.
d. Virtualization will save software costs.

A

Virtualization will conserve resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following applies to virtual machines, no matter what type of virtualization software they are created with?
a. They can only belong to one VLAN.
b. They cannot be addressed by clients on a physical LAN.
c. They cannot be assigned Internet-routable IP addresses.
d. They exist as files on the hard drive of their host.

A

They exist as files on the hard drive of their host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have created a virtual machine on your workstation so that you can test some new
applications. You configured the VM’s hard disk space to be dynamically allocated.
Which of the following will allocate more space for the VM when it needs it?
a. Virtual switch
b. Virtual adapter
c. Hypervisor
d. Virtual network manager

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are running KVM on a Fedora Linux computer and have configured a virtual
server to use the bridged networking type. The IP address of your host machine’s NIC is
192.168.25.71. Assuming your physical LAN uses DHCP, which of the following
addresses is most likely the one assigned to your virtual server?
a. 192.168.25.1
b. 192.168.25.83
c. 192.168.0.0
d. Not enough information to draw a conclusion

A

192.168.25.83

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is the default networking type assigned to vNICs in most
virtualization programs?
a. Host-only
b. Grouped
c. NAT
d. Bridged

A

NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

You have decided to create four virtual Web servers on a Windows Server 2008 R2
server using Hyper-V R2. Which of the following configuration options would you use
to make sure the Web servers are accessible to users across the Internet?
a. Private virtual network
b. Host virtual network
c. External virtual network
d. Internal virtual network

A

External virtual network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You work second shift and share a desktop workstation with your colleagues who work
on the first and third shifts. Each of you has a separate virtual machine on the
workstation. When your third-shift coworker installs a new program on his VM, it
causes the virtual machine’s operating system to stop working. What happens as a
consequence?
a. Your VM’s operating system stops working.
b. The host machine’s operating system stops working.
c. Your VM and the host machine work as usual, but performance of all the VMs is
compromised.
d. Nothing changes for your VM.

A

Nothing changes for your VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Each of the VMs on your host computer is configured to use the NAT networking
type. They can still pick up e-mail and surf the Web. How are they getting their
IP addresses?
a. From the host machine’s virtualization software
b. From the DHCP server on the physical network
c. From the router on the physical network
d. From another VM on the host machine that’s configured to act as a DHCP

A

From the host machine’s virtualization software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following network configuration types is best used for a company’s e-mail
server?
a. Host-only
b. Bridged
c. NAT
d. Grouped

A

Bridged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following network configuration types prevents VMs from exchanging
traffic with nodes other than the workstation they are installed on?
a. Host-only
b. Bridged
c. NAT
d. Grouped

A

Host-only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You manage a data center for a large ISP that hosts virtual Web and mail servers for
many customers. One of your physical servers has four NICs and hosts four mail
servers. How many vNICs can you assign to each of the mail servers?
a. 1
b. 2
c. 4
d. It depends on the virtualization software.

A

It depends on the virtualization software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Because of the functions it performs, each port on a virtual switch can also be
considered a _______.
a. Virtual machine
b. Virtual bridge
c. Virtual router
d. Virtual firewall

A

Virtual bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have created multiple virtual machines on your workstation to test different unified
communications programs. You want these machines to be available to your IT
colleagues for testing, but you do not want the traffic generated by their use to interfere
with routine business LAN traffic. Meanwhile, on another workstation a coworker has
installed additional communications programs for review. You decide to create a new
VLAN devoted to software evaluation. Where do you add your coworker’s virtual
machines to the new VLAN?
a. On your host workstation, where you established the new VLAN
b. On the LAN switch, which manages the VLAN
c. On your friend’s host workstation, where the virtual machin

A

On your friend’s host workstation, where the virtual machines reside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How must a physical NIC be configured so that it can connect its host’s VMs to
multiple VLANs?
a. As a trunk
b. As a port group
c. As a channel
d. As a team

A

As a trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

To complete its VPN connection, your computer is using RDP. Which of the following
VPN types are you participating in?
a. Site-to-link
b. Site-to-site
c. Link-to-client
d. Client-to-site

A

Client-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In which of the following situations would you use RDP?
a. To enable someone else to control your workstation, which is running a Windows
operating system
b. To establish a VPN between your home workstation and your office LAN
c. To remotely control a distant workstation that’s running a UNIX or Linux operating
system
d. To manage a pool of modems available for multiple users to log on to your
network from a distance

A

To enable someone else to control your workstation, which is running a Windows operating system

17
Q

You have decided to set up a VPN between your home and your friend’s home so that
you can run a private digital telephone line over your DSL connections. Each of you has
purchased a small Cisco router for terminating the VPN endpoints. Which of the
following protocols could you use to create a tunnel between these two routers?
a. L2TP
b. PPTP
c. PP2T
d. SLIP

A

L2TP

18
Q

A VPN is designed to connect 15 film animators and programmers from around the
state of California. At the core of the VPN is a router connected to a high-performance
server used for storing the animation files. The server and router are housed in an ISP’s
data center. The ISP provides two different T3 connections to the Internet backbone.
What type of connection must each of the animators and programmers have to access
the VPN?
a. At least a fractional T1 connection to the Internet
b. At least a T1 connection to the Internet
c. At least a T3 connection to the Internet
d. Any type of Internet connection

A

Any type of Internet connection

19
Q

Which of the following functions makes VPN protocols unique?
a. The ability to precisely time packet delivery
b. The ability to interpret both frames and datagrams
c. The ability to create tunnels
d. The ability to detect eavesdropping

A

The ability to create tunnels

20
Q

As a business owner, you have decided to outsource all of your company’s IT services to
a cloud computing service provider. How can your clients and employees access these
services?
a. From a smartphone using cellular signals
b. From a desktop workstation attached to a DSL Internet connection
c. From a server at an office overseas, using a T1
d. All of the above

A

All of the above