Name: 
 

Chapter10



True/False
Indicate whether the statement is true or false.
 

 1. 

Using a virtualization program, you can create dozens of different VMs.
 

 2. 

A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
 

 3. 

The software required to establish VPNs is usually expensive.
 

 4. 

PPTP and L2TP are the only protocols that can be used to carry VPN traffic.
 

 5. 

Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

The physical computer on a virtual machine is known as a ____.
a.
guest
c.
host
b.
client
d.
server
 

 2. 

Each VM is known as a ____.
a.
guest
c.
client
b.
host
d.
node
 

 3. 

____ is the most widely implemented virtualization software today.
a.
Hyper-V
c.
VirtualBox
b.
Citrix
d.
VMware
 

 4. 

To connect to a network, a virtual machine requires a ____.
a.
virtual switch
c.
physical switch
b.
virtual adapter
d.
virtual MAC address
 

 5. 

Upon creation, each vNIC is automatically assigned a ____.
a.
MAC address
c.
block address
b.
switch address
d.
reference address
 

 6. 

____ connect vNICs with a network, whether virtual or physical.
a.
Virtual routers
c.
Virtual duplexers
b.
Virtual crossovers
d.
Virtual bridges
 

 7. 

In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.
a.
guest machine
c.
host machine
b.
reference machine
d.
management machine
 

 8. 

____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host’s operating system.
a.
Host-only
c.
Bridged
b.
NAT
d.
Blocked
 

 9. 

____ refers to dialing directly into a private network’s or ISP’s remote access server to log on to a network.
a.
Dialed networking
c.
Dial-up networking
b.
Traditional networking
d.
Virtual networking
 

 10. 

When a server compares a user’s credentials with those in its database, the process is known as ____.
a.
authorization
c.
administration
b.
authentication
d.
accounting
 

 11. 

In the case of dial-up networking, the term ____ refers to a modem.
a.
serial connection
c.
physical connection
b.
virtual connection
d.
POTS connection
 

 12. 

A ____ uses very little hard disk space or processing power from the workstation on which it is installed.
a.
thick client
c.
thin client
b.
fat client
d.
virtual client
 

 13. 

____ is the remote virtual computing software that comes with Windows client and server operating systems.
a.
Remote Server
c.
Remote Windows
b.
Remote Client
d.
Remote Desktop
 

 14. 

____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
a.
Remote Desktop
c.
Citrix
b.
VNC
d.
Xen
 

 15. 

____ are wide area networks that are logically defined over public transmission systems.
a.
VPNs
c.
Private lines
b.
Leased lines
d.
Dial-up lines
 

 16. 

VPNs can be classified based on the kinds of ____ they connect.
a.
hardware
c.
endpoints
b.
software
d.
circuits
 

 17. 

In a ____ VPN, tunnels connect multiple sites on a WAN.
a.
site-to-site
c.
client-to-client
b.
site-to-client
d.
link-to-line
 

 18. 

A VPN tunneling protocol operates at the ____ layer.
a.
Network
c.
Session
b.
Application
d.
Data Link
 

 19. 

On network diagrams, the Internet is frequently depicted as a ____.
a.
block
c.
line
b.
cloud
d.
lightening bolt
 

 20. 

In ____, each datagram can follow one of many paths to reach its destination.
a.
circuit switching
c.
packet switching
b.
line switching
d.
data switching
 

 21. 

____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.
a.
Virtual
c.
Material
b.
Physical
d.
Guest
 

Completion
Complete each statement.
 

 1. 

The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.
 

 

 2. 

A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.
 

 

 3. 

In bridged mode, a(n) ____________________ accesses a physical network using the host machine’s NIC.
 

 

 4. 

In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
 

 

 5. 

____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.
 

 

Matching
 
 
Match each term with the correct statement below.
a.
XaaS
f.
elastic
b.
Tunnel
g.
cloud services
c.
Multitenant
h.
open source
d.
Virtualization
i.
NaaS
e.
L2TP
 

 1. 

The emulation of a computer, operating system environment, or application on a physical system.
 

 2. 

Software whose code is publicly available for use and modification.
 

 3. 

The virtual connection between two VPN endpoints.
 

 4. 

A standard accepted and used by multiple different vendors, so it can connect a VPN that uses a mix of equipment types.
 

 5. 

Services and storage capacity can be quickly and dynamically—sometimes even automatically—scaled up or down.
 

 6. 

When multiple customers share storage locations or services without knowing it.
 

 7. 

A service provider offers its customers a complete set of networking services.
 

 8. 

The cloud assumes functions that go beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
 

 9. 

May be managed and delivered by a service provider over public transmission lines, such as the Internet.
 

Short Answer
 

 1. 

What are three advantages of virtualization?
 

 2. 

List two potential disadvantages to create multiple guests on a single host machine.
 

 3. 

Where do virtual switches or bridges and their configuration reside?
 

 4. 

Describe the purpose of RRAS and how it is used.
 

 5. 

Describe PPPoE.
 

 6. 

Describe how remote virtual computing is used.
 

 7. 

What are two important considerations when designing a VPN?
 

 8. 

Describe the L2TP technology.
 

 9. 

List two things that distinguish cloud computing.
 

 10. 

Describe metered service.
 



 
Check Your Work     Start Over