Deck 10: Virtual Networks and Remote Access
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 10: Virtual Networks and Remote Access
1
____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network.
A) Dialed networking
B) Traditional networking
C) Dial-up networking
D) Virtual networking
A) Dialed networking
B) Traditional networking
C) Dial-up networking
D) Virtual networking
C
2
A ____ uses very little hard disk space or processing power from the workstation on which it is installed.
A) thick client
B) fat client
C) thin client
D) virtual client
A) thick client
B) fat client
C) thin client
D) virtual client
C
3
PPTP and L2TP are the only protocols that can be used to carry VPN traffic.
False
4
____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.
A) Host-only
B) NAT
C) Bridged
D) Blocked
A) Host-only
B) NAT
C) Bridged
D) Blocked
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Using a virtualization program, you can create dozens of different VMs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.
A) guest machine
B) reference machine
C) host machine
D) management machine
A) guest machine
B) reference machine
C) host machine
D) management machine
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ connect vNICs with a network, whether virtual or physical.
A) Virtual routers
B) Virtual crossovers
C) Virtual duplexers
D) Virtual bridges
A) Virtual routers
B) Virtual crossovers
C) Virtual duplexers
D) Virtual bridges
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
To connect to a network, a virtual machine requires a ____.
A) virtual switch
B) virtual adapter
C) physical switch
D) virtual MAC address
A) virtual switch
B) virtual adapter
C) physical switch
D) virtual MAC address
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The physical computer on a virtual machine is known as a ____.
A) guest
B) client
C) host
D) server
A) guest
B) client
C) host
D) server
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Most cloud service providers use virtualization software to supply multiple platforms to multiple users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ is the most widely implemented virtualization software today.
A) Hyper-V
B) Citrix
C) VirtualBox
D) VMware
A) Hyper-V
B) Citrix
C) VirtualBox
D) VMware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Each VM is known as a ____.
A) guest
B) host
C) client
D) node
A) guest
B) host
C) client
D) node
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Upon creation, each vNIC is automatically assigned a ____.
A) MAC address
B) switch address
C) block address
D) reference address
A) MAC address
B) switch address
C) block address
D) reference address
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
A) Remote Desktop
B) VNC
C) Citrix
D) Xen
A) Remote Desktop
B) VNC
C) Citrix
D) Xen
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The software required to establish VPNs is usually expensive.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
When a server compares a user's credentials with those in its database, the process is known as ____.
A) authorization
B) authentication
C) administration
D) accounting
A) authorization
B) authentication
C) administration
D) accounting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In the case of dial-up networking, the term ____ refers to a modem.
A) serial connection
B) virtual connection
C) physical connection
D) POTS connection
A) serial connection
B) virtual connection
C) physical connection
D) POTS connection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is the remote virtual computing software that comes with Windows client and server operating systems.
A) Remote Server
B) Remote Client
C) Remote Windows
D) Remote Desktop
A) Remote Server
B) Remote Client
C) Remote Windows
D) Remote Desktop
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ are wide area networks that are logically defined over public transmission systems.
A) VPNs
B) Leased lines
C) Private lines
D) Dial-up lines
A) VPNs
B) Leased lines
C) Private lines
D) Dial-up lines
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Describe the purpose of RRAS and how it is used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
On network diagrams, the Internet is frequently depicted as a ____.
A) block
B) cloud
C) line
D) lightening bolt
A) block
B) cloud
C) line
D) lightening bolt
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
VPNs can be classified based on the kinds of ____ they connect.
A) hardware
B) software
C) endpoints
D) circuits
A) hardware
B) software
C) endpoints
D) circuits
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Where do virtual switches or bridges and their configuration reside?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
List two potential disadvantages to create multiple guests on a single host machine.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The software that allows you to define VMs and manages resource allocation and sharing among them is known as a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A VPN tunneling protocol operates at the ____ layer.
A) Network
B) Application
C) Session
D) Data Link
A) Network
B) Application
C) Session
D) Data Link
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are three advantages of virtualization?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
In a ____ VPN, tunnels connect multiple sites on a WAN.
A) site-to-site
B) site-to-client
C) client-to-client
D) link-to-line
A) site-to-site
B) site-to-client
C) client-to-client
D) link-to-line
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Describe how remote virtual computing is used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Describe PPPoE.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.
A) Virtual
B) Physical
C) Material
D) Guest
A) Virtual
B) Physical
C) Material
D) Guest
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are two important considerations when designing a VPN?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
In ____, each datagram can follow one of many paths to reach its destination.
A) circuit switching
B) line switching
C) packet switching
D) data switching
A) circuit switching
B) line switching
C) packet switching
D) data switching
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe the L2TP technology.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
In bridged mode, a(n) ____________________ accesses a physical network using the host machine's NIC.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe metered service.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
List two things that distinguish cloud computing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck