Shared Flashcard Set

Details

Ch10 Virtual Networks and Remote Access
N/A
80
Computer Networking
Graduate
06/20/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
You work second shift and share a desktop workstation with your colleagues who work on the first and third shifts. Each of you has a separate virtual machine on the workstation. When your third-shift coworder installs a new program on his VM, it causes the machine's operating system to stop working. What happens as a consequence?
A. The host machine's operating system stops working.
B. Your VM and the host machine work as usual, but performance of all the VMs is compromised.
C. Nothing changes for your VM.
D. Your VM's operating system stops working.
Definition
C. Nothing changes for your VM.
Term
In the case of dial-up networking, the term _____ refers to a modem.
A. POTS connection
B. serial connection
C. virtual connection
D. physical connection
Definition
B. serial connection
Term
PPTP is a protocol that is ideally meant for _____.
A. Dial-up
B. VPNs
C. LAN connections
D. None of the above
Definition
B. VPNs
Term
On network diagrams, the Internet is frequently depicted as a _____.
A. block
B. lightening bolt
C. line
D. cloud
Definition
D. cloud
Term
Which of the following is the default networking type assigned to vNICs in most virtualization programs?
A. Host-only
B. NAT
C. Bridged
D. Grouped
Definition
B. NAT
Term
You have decided to set up a VPN between your home and your friend's home so that you can run a private digital telephone line over your DSL connections. Each of you has purchased a small Cisco router for terminating the VPN endpoints. Which of the following protocols could you use to create a tunnel between these two routers?
A. L2TP
B. PPTP
C. PP2T
D. SLIP
Definition
A. L2TP
Term
In _____, each datagram can follow one of many paths to reach its destination.
A. packet switching
B. line switching
C. data switching
D. circuit switching
Definition
A. packet switching
Term
You have decided to create four virtual Web servers on a Windows 2008 R2 server using Hyper-V R2. Which of the following configuration options would you use to make sure the Web servers are accessible to users across the Internet?
A. Private virtual network
B. Internal virtual network
C. Host virtual network
D. External virtual network
Definition
D. External virtual network
Term
Which of the following is an advantage to virtualizing many servers in your data center, compared to running each server on a separate physical machine?
A. Virtualization will conserve resources.
B. Virtualization will make administration easier.
C. Virtualization will improve the servers' performance.
D. Virtualization will save software costs.
Definition
A. Virtualization will conserve resources.
Term
Which of the following functions makes VPN protocols unique?
A. The ability to precisely time packet delivery
B. The ability to create tunnels
C. The ability to interpret both frames and datagrams
D. The ability to detect eavesdropping
Definition
B. The ability to create tunnels
Term
Upon creation, each vNIC is automatically assigned a _____.
A. block address
B. reference address
C. MAC address
D. switch address
Definition
C. MAC address
Term
A VPN is designed to connect 15 film animators and programmers from around the state of California. At the core of the VPN is a router connected to a high-performance server used for storing the animation files. The server and router are housed in an ISP's data center. The ISP provides two different T3 connections to the Internet backbone. What type of connection must each of the animators and programmers have to access the VPN?
A. At least a fractional T1 connection to the Internet
B. Any type of Internet connection
C. At least a T3 connection to the Internet
D. At least a T1 connection to the Internet
Definition
B. Any type of Internet connection
Term
VPNs can be classified based on the kinds of _____ they connect.
A. software
B. hardware
C. circuits
D. endpoints
Definition
D. endpoints
Term
The physical computer on a virtual machine is known as a _____.
A. host
B. client
C. guest
D. server
Definition
A. host
Term
Each VM is known as _____.
A. client
B. guest
C. host
D. node
Definition
B. guest
Term
You have created multiple virtual machines on your workstation to test different unified communications programs. You want these machines to be available to your IT colleagues for testing, but you do not want the traffic generated by their use to interfere with routine business LAN traffic. Meanwhile, on another workstation a coworker has installed additional communications programs for review. You decide to create a new VLAN devoted to software evaluation. Where do you add your coworker's virtual machines to the new VLAN?
A. On your host workstation, where you established the new VLAN
B. On the LAN switch, which manages the VLAN
C. On your friend's host workstation, where the virtual machines reside
D. On the LAN router, which directs traffic between VLANs
Definition
C. On your friend's host workstation, where the virtual machines reside
Term
As a business owner, you have decided to outsource all of your company's IT services to a cloud computing service provider. How can your clients and employees access these services?
A. From a desktop workstation attached to a DSL Internet connection
B. From a smartphone using cellular signals
C. From a server at an office overseas, using a T1
D. All of the above
Definition
D. All of the above
Term
Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP addresses?
A. From the router on the physical network
B. From the DHCP server on the physical network
C. From another VM on the host machine that's configured to act as a DHCP server
D. From the host machine's virtualization software
Definition
D. From the host machine's virtualization software
Term
You have created a virtual machine on your workstation so that you can test some new applications. You configured the VM's hard disk space to be dynamically allocated. Which of the following will allocate more space for the VM when it needs it?
A. Virtual adapter
B. Virtual network manager
C. Virtual switch
D. Hypervisor
Definition
D. Hypervisor
Term
Which of the following network configuration types prevents VMs from exchanging traffic with nodes other than the workstation the are installed on?
A. Grouped
B. Bridged
C. Host-only
D. NAT
Definition
C. Host-only
Term
Which of the following applies to virtual machines, no matter what type of virtualization software they are crated with?
A. They can only belong to one VLAN.
B. They cannot be addressed by clients on a physical LAN.
C. They exist as files on the hard drive of their host.
D. They cannot be assigned Internet-routable IP addresses.
Definition
C. They exist as files on the hard drive of their host.
Term
To complete its VPN connection, your computer is using RDP. Which of the following VPN types are you participating in?
A. Site-to-site
B. Client-to-site
C. Link-to-client
D. Site-to-link
Definition
B. Client-to-site
Term
You are running KVM on a Fedora Linux computer and have configured a virtual server to use the bridged networking bype. The IP address of your host machine's NIC is 192.168.25.71. Assuming your physical LAN uses DHCP, which of the following addresses is most likely the one assigned to your virtual server?
A. 192.168.25.1
B. 192.168.0.0
C. Not enough information to draw a conclusion
D. 192.168.25.83
Definition
D. 192.168.25.83
Term
Layer 2 Tunneling Protocol (L2TP): (Select 3)
A. runs over TCP port 1723
B. offers authentication
C. is used with IPsec
D. offers no encryption
E. runs over UDP port 1701
Definition
C. is used with IPsec
D. offers no encryption
E. runs over UDP port 1701
Term
To connect to a network, a virtual machine requires a _____.
A. virtual switch
B. virtual MAC address
C. physical switch
D. virtual adapter
Definition
D. virtual adapter
Term
Which TCP port is used by Point-to-Point Tunneling Protocol (PPTP)?
A. 1723
B. 1701
C. 1813
D. 1812
Definition
A. 1723
Term
In which of the following situations would you use RDP?
A. To establish a VPN between your home workstation and your office LAN
B. To remotely control a distant workstation that's running a UNIX or Linux operating system
C. To manage a pool of modems available for multiple users to log onto your network from a distance
D. To enable someone else to control your workstation, which is running a Windows operating system
Definition
D. To enable someone else to control your workstation, which is running a Windows operating system
Term
UNIX is an open source Operating system. T/F?
A. True
B. False
Definition
B. False
Term
In a ____ VPN, tunnels connect multiple sites on a WAN.
A. link-to-line
B. site-to-site
C. client-to-client
D. site-to-client
Definition
B. site-to-site
Term
In the NAT networking mode, a vNIC relies on the _____ to act as a NAT device.
A. reference machine
B. host machine
C. management machine
D. guest machine
Definition
B. host machine
Term
Which of the following network configuration types is best used for a company's e-mail server?
A. Host-only
B. Bridged
C. NAT
D. Grouped
Definition
B. Bridged
Term
You manage a data center for a large ISP that hosts virtual Web and mail servers for many customers. One of your physical servers has four NICs and hosts four mail servers. How many vNICs can you assign to each of the mail servers?
A. 1
B. 2
C. 4
D. It depends on the virtualization software
Definition
D. It depends on the virtualization software
Term
Because of the functions it performs, each port on a virtual switch can also be considered a _____.
A. Virtual machine
B. Virtual bridge
C. Virtual router
D. Virtual firewall
Definition
B. Virtual bridge
Term
How must a physical NIC be configured so that it can connect its host's VMs to multiple VLANs?
A. As a trunk
B. As a port group
C. As a channel
D. As a team
Definition
A. As a trunk
Term
authentication
Definition
The process of comparing and matching a client's credentials with the credentials in the NOS user database to enable the client to log on to the network.
Term
client-to-site VPN
Definition
A type of VPN in which clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway. Each client on a client-to=site VPN must run VPN software to create the tunnel for, and encrypt and encapsulate data.
Term
cloud computing
Definition
The flexible provision of data storage, applications, or services to multiple clients over a network. Cloud computing consolidates resources and is elastic, metered, self-service, multiplatform, and available on demand.
Term
credentials
Definition
A user's unique identifying characteristics that enable him to authenticate with a server and gain access to network resources. The most common credentials are a username and a password.
Term
dial-up networking
Definition
The process of dialing into a remote access server to connect with a network, be it private or public.
Term
elastic
Definition
A characteristic of cloud computing that means services can be quickly and dynamically - sometimes even automatically - scaled up or down.
Term
guest
Definition
In the context of virtualization, a virtual machine operated and managed by a virtualization program.
Term
host
Definition
In the context of virtualization, the physical computer on which virtualization software operates and manages guests.
Term
Hyper-V
Definition
Microsoft's virtualization software package. Hyper-V operates with Windows Server 2008 and Windows Server 2008 R2.
Term
hypervisor
Definition
The element of virtualization software that manages multiple guest machines and their connections to the host (and by association, to a physical network). A hypervisor is also known as a virtual machine manager.
Term
ICA (Independent Computing Architecture)
Definition
The software from Citrix Systems, Inc., that, when installed on a client, enables the client to connect with a host computer and exchange keystrokes, mouse clicks, and screen updates. Citrix's ICA client can work with virtually any operating system or application.
Term
KVM (Kernel-based Virtual Machine)
Definition
As open source virtualization package designed for use with Linux systems.
Term
L2TP (Layer 2 Tunneling Protocol)
Definition
A protocol that encapsulates PPP data, for use on VPNs. L2TP is based on Cisco technology and is standardized by the IETF. It is distinguished by its compatibility among different manufacturers' equipment; its ability to connect between clients, routers, and servers alike; and also by the fact that it can connect nodes belonging to different Layer 3 networks.
Term
multitenant
Definition
A feature of cloud computing in which multiple customers share storage locations or services without knowing it.
Term
NaaS (Network as a Service)
Definition
A type of cloud computing that offers clients a complete set of networking services - for example, mail, Web, DNS, DHCP, and remote access services, plus LAN and WAN connectivity.
Term
open source
Definition
The term that describes software whose code is publicly available for use and modification.
Term
PPP (Point-to-Point Protocol)
Definition
A communications protocol that enables a workstation to connect to a server using a serial connection. PPP can support multiple Network layer protocols and can use both asynchronous and synchronous communications. It performs compression and error correction and requires little configuration on the client workstation.
Term
PPPoE (Point-to-Point Protocol over Ethernet)
Definition
PPP running over an Ethernet network.
Term
PPTP (Point-to-Point Tunneling Protocol)
Definition
A Layer 2 protocol developed by Microsoft that encapsulates PPP data for transmission over VPN connections. PPTP operates with Windows RRAS access services and can accept connections from multiple different clients. It is simple, but less secure than other modern tunneling protocols.
Term
private cloud
Definition
An arrangement in which shared and flexible data storage, applications, or services are managed on and delivered via an organization's internal network.
Term
public cloud
Definition
An arrangement in which shared and flexible data storage, applications, or services are managed centrally by service providers and delivered over public transmission lines, such as the Internet. Rackspace and Amazon (with its EC2 offering) are leading public cloud service providers.
Term
RAS (Remote Access Service)
Definition
The dial-up networking software provided with Microsoft Windows 95, 98, NT, and 2000 client operating systems. RAS requires software installed on both the client and server, a server configured to accept incoming clients, and a client with sufficient privileges (including username and password) on the server to access its resources. In more recent versions of Windows, RAS has been incorporated into the RRAS (Routing and Remote Access Service).
Term
RDP (Remote Desktop Protocol)
Definition
An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. RDP also carries session, licensing, and encryption information.
Term
remote access
Definition
A method for connecting and logging on to a LAN from a workstation that is remote, or not physically connected, to the LAN.
Term
Remote Desktop
Definition
A feature of Windows operating systems that allows a computer to act as a remote host and be controlled from a client running another Windows operating system.
Term
Routing and Remote Access Service (RRAS)
Definition
The software included with Windows operating systems that enables a server to act as a router, firewall, and remote access server. Using RRAS, a server can provide network access to multiple remote clients.
Term
site-to-site VPN
Definition
A type of VPN in which VPN gateways at multiple sites encrypt and encapsulate data to exchange over a tunnel with other VPN gateways. Meanwhile, clients, servers, and other hosts on a site-to-site VPN communicate with the VPN gateway.
Term
SLIP (Serial Line Internet Protocol)
Definition
A communications protocol that enables a workstation to connect to a server using a serial connection. SLIP can support only asynchronous communications and IP traffic and require some configuration on the client workstation. SLIP has been made obsolete by PPP.
Term
thin client
Definition
A client that relies on another host for the majority of processing and hard disk resources necessary to run applications and share files over the network.
Term
tunnel
Definition
A secured, virtual connection between two nodes on a VPN.
Term
tunneling
Definition
The process of encapsulating one type of protocol in another. Tunneling is the way in which higher-layer data is transported over VPNs by Layer 2 protocols.
Term
virtual appliance
Definition
An image that includes the appropriate operating system, software, hardware specifications, and application configuration necessary for a prepackaged solution to run properly on a virtual machine.
Term
virtual bridge
Definition
An interface connecting a vNIC with a virtual or physical network, or a port on a virtual switch.
Term
virtual desktop
Definition
A desktop operating environment that is hosted virtually, on a different physical computer from the one the user interacts with.
Term
virtual server
Definition
A server that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.
Term
virtual switch
Definition
A logically defined device that is created and managed by virtualization software and that operates at the Data Link layer. Ports on a virtual switch connect virtual machines with a network, whether virtual or physical, through the host's physical NIC.
Term
virtual workstation
Definition
A workstation that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.
Term
VirtualBox
Definition
A virtualization software platform from Oracle.
Term
virtualization
Definition
The emulation of a computer, operating system environment, or application on a physical system.
Term
VM (virtual machine)
Definition
A computer that exists in emulation on a physical computer, or host machine. Multiple VMs may exist on one host where they share the physical computer's CPU, hard disk, memory, and network interfaces.
Term
VMWare
Definition
A vendor that supplies the most popular types of workstation and server virtualization software. Used casually, the VMWare may also refer to the virtualization software distributed by the company.
Term
VNC (Virtual Network Computing)
Definition
An open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. Examples of VNC software include RealVNC, TightVNC, and UltraVNC.
Term
vNIC (virtual network interface card)
Definition
A logically defined network interface associated with a virtual machine.
Term
VPN (virtal private network)
Definition
A logically constructed WAN that uses existing public transmission systems. VPNs can be created through the use of software or combined software and hardware solutions. This type of network allows an organization to carve out a private WAN through the Internet, serving only its offices, while keeping the data secure and isolated form other (public) traffic.
Term
XaaS (Anything as a Service, or Everything as a Service)
Definition
A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Term
Xen
Definition
An open source virtualization software platform form Citrix Systems.
Supporting users have an ad free experience!