True/False Indicate whether the
statement is true or false.
|
|
1.
|
Using a virtualization program, you can create dozens of different VMs.
|
|
2.
|
A VM must use the same operating system, type of CPU, storage drive, and NIC as
the physical computer it resides on.
|
|
3.
|
The software required to establish VPNs is usually expensive.
|
|
4.
|
PPTP and L2TP are the only protocols that can be used to carry VPN
traffic.
|
|
5.
|
Most cloud service providers use virtualization software to supply multiple
platforms to multiple users.
|
Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
The physical computer on a virtual machine is known as a ____.
a. | guest | c. | host | b. | client | d. | server |
|
|
2.
|
Each VM is known as a ____.
a. | guest | c. | client | b. | host | d. | node |
|
|
3.
|
____ is the most widely implemented virtualization software today.
a. | Hyper-V | c. | VirtualBox | b. | Citrix | d. | VMware |
|
|
4.
|
To connect to a network, a virtual machine requires a ____.
a. | virtual switch | c. | physical switch | b. | virtual adapter | d. | virtual MAC
address |
|
|
5.
|
Upon creation, each vNIC is automatically assigned a ____.
a. | MAC address | c. | block address | b. | switch address | d. | reference
address |
|
|
6.
|
____ connect vNICs with a network, whether virtual or physical.
a. | Virtual routers | c. | Virtual duplexers | b. | Virtual crossovers | d. | Virtual bridges |
|
|
7.
|
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT
device.
a. | guest machine | c. | host machine | b. | reference machine | d. | management
machine |
|
|
8.
|
____ mode is appropriate for test networks or if you simply need to install a
different operating system on your workstation to use a program that is incompatible with your
host’s operating system.
a. | Host-only | c. | Bridged | b. | NAT | d. | Blocked |
|
|
9.
|
____ refers to dialing directly into a private network’s or ISP’s
remote access server to log on to a network.
a. | Dialed networking | c. | Dial-up networking | b. | Traditional networking | d. | Virtual
networking |
|
|
10.
|
When a server compares a user’s credentials with those in its database,
the process is known as ____.
a. | authorization | c. | administration | b. | authentication | d. | accounting |
|
|
11.
|
In the case of dial-up networking, the term ____ refers to a modem.
a. | serial connection | c. | physical connection | b. | virtual connection | d. | POTS connection |
|
|
12.
|
A ____ uses very little hard disk space or processing power from the workstation
on which it is installed.
a. | thick client | c. | thin client | b. | fat client | d. | virtual client |
|
|
13.
|
____ is the remote virtual computing software that comes with Windows client and
server operating systems.
a. | Remote Server | c. | Remote Windows | b. | Remote Client | d. | Remote Desktop |
|
|
14.
|
____ is an open source system designed to allow one workstation to remotely
manipulate and receive screen updates from another workstation.
a. | Remote Desktop | c. | Citrix | b. | VNC | d. | Xen |
|
|
15.
|
____ are wide area networks that are logically defined over public transmission
systems.
a. | VPNs | c. | Private lines | b. | Leased lines | d. | Dial-up lines |
|
|
16.
|
VPNs can be classified based on the kinds of ____ they connect.
a. | hardware | c. | endpoints | b. | software | d. | circuits |
|
|
17.
|
In a ____ VPN, tunnels connect multiple sites on a WAN.
a. | site-to-site | c. | client-to-client | b. | site-to-client | d. | link-to-line |
|
|
18.
|
A VPN tunneling protocol operates at the ____ layer.
a. | Network | c. | Session | b. | Application | d. | Data Link |
|
|
19.
|
On network diagrams, the Internet is frequently depicted as a ____.
a. | block | c. | line | b. | cloud | d. | lightening bolt |
|
|
20.
|
In ____, each datagram can follow one of many paths to reach its
destination.
a. | circuit switching | c. | packet switching | b. | line switching | d. | data switching |
|
|
21.
|
____ desktops are desktop operating environments hosted virtually, on a
different physical computer from the one with which the user interacts.
a. | Virtual | c. | Material | b. | Physical | d. | Guest |
|
Completion Complete each
statement.
|
|
1.
|
The software that allows you to define VMs and manages resource allocation and
sharing among them is known as a(n) ____________________.
|
|
2.
|
A(n) ____________________ is a logically defined device that operates at the
Data Link layer to pass frames between nodes.
|
|
3.
|
In bridged mode, a(n) ____________________ accesses a physical network using the
host machine’s NIC.
|
|
4.
|
In a(n) ____________________ VPN, clients, servers, and other hosts establish
tunnels with a private network using a remote access server or VPN gateway.
|
|
5.
|
____________________ refers to the flexible provision of data storage,
applications, or services to multiple clients over a network.
|
Matching
|
|
|
Match each term with the correct statement below. a. | XaaS | f. | elastic | b. | Tunnel | g. | cloud services | c. | Multitenant | h. | open source | d. | Virtualization | i. | NaaS | e. | L2TP |
|
|
1.
|
The emulation of a computer, operating system environment, or application on a
physical system.
|
|
2.
|
Software whose code is publicly available for use and modification.
|
|
3.
|
The virtual connection between two VPN endpoints.
|
|
4.
|
A standard accepted and used by multiple different vendors, so it can connect a
VPN that uses a mix of equipment types.
|
|
5.
|
Services and storage capacity can be quickly and dynamically—sometimes
even automatically—scaled up or down.
|
|
6.
|
When multiple customers share storage locations or services without knowing
it.
|
|
7.
|
A service provider offers its customers a complete set of networking
services.
|
|
8.
|
The cloud assumes functions that go beyond networking, including, for example,
monitoring, storage, applications, and virtual desktops.
|
|
9.
|
May be managed and delivered by a service provider over public transmission
lines, such as the Internet.
|
Short Answer
|
|
1.
|
What are three advantages of virtualization?
|
|
2.
|
List two potential disadvantages to create multiple guests on a single host
machine.
|
|
3.
|
Where do virtual switches or bridges and their configuration reside?
|
|
4.
|
Describe the purpose of RRAS and how it is used.
|
|
5.
|
Describe PPPoE.
|
|
6.
|
Describe how remote virtual computing is used.
|
|
7.
|
What are two important considerations when designing a VPN?
|
|
8.
|
Describe the L2TP technology.
|
|
9.
|
List two things that distinguish cloud computing.
|
|
10.
|
Describe metered service.
|