Term
|
Definition
A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops. |
|
|
Term
|
Definition
The process of comparing and matching a client's credentials with the credentials in the NOS user database to enable the client to log on to the network. |
|
|
Term
|
Definition
A type of VPN in which clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway. Each client on a client-to-site VPN must run VPN software to create the tunnel for, and encrypt and encapsulate data. |
|
|
Term
|
Definition
The flexible provision of data storage, applications, or services to multiple clients over a network. Cloud computing consolidates resources and is elastic, metered, self-service, multiplatform, and available on demand. |
|
|
Term
|
Definition
A user's unique identifying characteristics that enable him to authenticate with a server and gain access to network resources. The most common credentials are a username and a password. |
|
|
Term
|
Definition
The process of dialing into a remote access server to connect with a network, be it private or public. |
|
|
Term
|
Definition
A characteristic of cloud computing that means services can be quickly and dynamically—sometimes even automatically—scaled up or down. |
|
|
Term
|
Definition
A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops. |
|
|
Term
|
Definition
In the context of virtualization, a virtual machine operated and managed by a virtualization program. |
|
|
Term
|
Definition
In the context of virtualization, the physical computer on which virtualization software operates and manages guests. |
|
|
Term
|
Definition
Microsoft's virtualization software package. Hyper-V operates with Windows Server 2008 and Windows Server 2008 R2. |
|
|
Term
|
Definition
The element of virtualization software that manages multiple guest machines and their connections to the host (and by association, to a physical network). A hypervisor is also known as a virtual machine manager. |
|
|
Term
ICA (Independent Computing Architecture) |
|
Definition
The software from Citrix Systems, Inc., that, when installed on a client, enables the client to connect with a host computer and exchange keystrokes, mouse clicks, and screen updates. Citrix's ICA client can work with virtually any operating system or application. |
|
|
Term
Kernel-based Virtual Machine |
|
Definition
An open source virtualization package designed for use with Linux systems. |
|
|
Term
|
Definition
(Kernel-based Virtual Machine)
An open source virtualization package designed for use with Linux systems. |
|
|
Term
|
Definition
(Layer 2 Tunneling Protocol) A protocol that encapsulates PPP data, for use on VPNs. L2TP is based on Cisco technology and is standardized by the IETF. It is distinguished by its compatibility among different manufacturers' equipment; its ability to connect between clients, routers, and servers alike; and also by the fact that it can connect nodes belonging to different Layer 3 networks. |
|
|
Term
Layer 2 Tunneling Protocol |
|
Definition
A protocol that encapsulates PPP data, for use on VPNs. L2TP is based on Cisco technology and is standardized by the IETF. It is distinguished by its compatibility among different manufacturers' equipment; its ability to connect between clients, routers, and servers alike; and also by the fact that it can connect nodes belonging to different Layer 3 networks. |
|
|
Term
|
Definition
A feature of cloud computing in which multiple customers share storage locations or services without knowing it. |
|
|
Term
|
Definition
(Network as a Service)
A type of cloud computing that offers clients a complete set of networking services—for example, mail, Web, DNS, DHCP, and remote access services, plus LAN and WAN connectivity. |
|
|
Term
|
Definition
A type of cloud computing that offers clients a complete set of networking services—for example, mail, Web, DNS, DHCP, and remote access services, plus LAN and WAN connectivity. |
|
|
Term
|
Definition
The term that describes software whose code is publicly available for use and modification. |
|
|
Term
|
Definition
A communications protocol that enables a workstation to connect to a server using a serial connection. PPP can support multiple Network layer protocols and can use both asynchronous and synchronous communications. It performs compression and error correction and requires little configuration on the client workstation. |
|
|
Term
Point-to-Point Protocol over Ethernet |
|
Definition
PPP running over an Ethernet network. |
|
|
Term
Point-to-Point Tunneling Protocol S |
|
Definition
A Layer 2 protocol developed by Microsoft that encapsulates PPP data for transmission over VPN connections. PPTP operates with Windows RRAS access services and can accept connections from multiple different clients. It is simple, but less secure than other modern tunneling protocols. |
|
|
Term
|
Definition
(Point-to-Point Protocol)
A communications protocol that enables a workstation to connect to a server using a serial connection. PPP can support multiple Network layer protocols and can use both asynchronous and synchronous communications. It performs compression and error correction and requires little configuration on the client workstation. |
|
|
Term
|
Definition
(Point-to-Point Protocol over Ethernet)
PPP running over an Ethernet network. |
|
|
Term
|
Definition
(Point-to-Point Tunneling Protocol)
A Layer 2 protocol developed by Microsoft that encapsulates PPP data for transmission over VPN connections. PPTP operates with Windows RRAS access services and can accept connections from multiple different clients. It is simple, but less secure than other modern tunneling protocols. |
|
|
Term
|
Definition
An arrangement in which shared and flexible data storage, applications, or services are managed on and delivered via an organization's internal network. |
|
|
Term
|
Definition
An arrangement in which shared and flexible data storage, applications, or services are managed centrally by service providers and delivered over public transmission lines, such as the Internet. Rackspace and Amazon (with its EC2 offering) are leading public cloud service providers. |
|
|
Term
|
Definition
(Remote Access Service)
The dial-up networking software provided with Microsoft Windows 95, 98, NT, and 2000 client operating systems. RAS requires software installed on both the client and server, a server configured to accept incoming clients, and a client with sufficient privileges (including username and password) on the server to access its resources. In more recent versions of Windows, RAS has been incorporated into the RRAS (Routing and Remote Access Service). |
|
|
Term
|
Definition
(Remote Desktop Protocol)
An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. RDP also carries session, licensing, and encryption information. |
|
|
Term
|
Definition
A method for connecting and logging on to a LAN from a workstation that is remote, or not physically connected, to the LAN. |
|
|
Term
|
Definition
The dial-up networking software provided with Microsoft Windows 95, 98, NT, and 2000 client operating systems. RAS requires software installed on both the client and server, a server configured to accept incoming clients, and a client with sufficient privileges (including username and password) on the server to access its resources. In more recent versions of Windows, RAS has been incorporated into the RRAS (Routing and Remote Access Service). |
|
|
Term
|
Definition
A feature of Windows operating systems that allows a computer to act as a remote host and be controlled from a client running another Windows operating system. |
|
|
Term
|
Definition
An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. RDP also carries session, licensing, and encryption information. |
|
|
Term
Routing and Remote Access Service |
|
Definition
The software included with Windows operating systems that enables a server to act as a router, firewall, and remote access server. Using RRAS, a server can provide network access to multiple remote clients. |
|
|
Term
|
Definition
(Routing and Remote Access Service )
The software included with Windows operating systems that enables a server to act as a router, firewall, and remote access server. Using RRAS, a server can provide network access to multiple remote clients. |
|
|
Term
Serial Line Internet Protocol |
|
Definition
A communications protocol that enables a workstation to connect to a server using a serial connection. SLIP can support only asynchronous communications and IP traffic and requires some configuration on the client workstation. SLIP has been made obsolete by PPP. |
|
|
Term
|
Definition
A type of VPN in which VPN gateways at multiple sites encrypt and encapsulate data to exchange over a tunnel with other VPN gateways. Meanwhile, clients, servers, and other hosts on a site-to-site VPN communicate with the VPN gateway. |
|
|
Term
|
Definition
(Serial Line Internet Protocol)
A communications protocol that enables a workstation to connect to a server using a serial connection. SLIP can support only asynchronous communications and IP traffic and requires some configuration on the client workstation. SLIP has been made obsolete by PPP. |
|
|
Term
|
Definition
A client that relies on another host for the majority of processing and hard disk resources necessary to run applications and share files over the network. |
|
|
Term
|
Definition
A secured, virtual connection between two nodes on a VPN. |
|
|
Term
|
Definition
The process of encapsulating one type of protocol in another. Tunneling is the way in which higher-layer data is transported over VPNs by Layer 2 protocols. |
|
|
Term
|
Definition
A logically defined network interface associated with a virtual machine. |
|
|
Term
|
Definition
An image that includes the appropriate operating system, software, hardware specifications, and application configuration necessary for a prepackaged solution to run properly on a virtual machine. |
|
|
Term
|
Definition
An interface connecting a vNIC with a virtual or physical network, or a port on a virtual switch. |
|
|
Term
|
Definition
A desktop operating environment that is hosted virtually, on a different physical computer from the one the user interacts with. |
|
|
Term
|
Definition
A computer that exists in emulation on a physical computer, or host machine. Multiple VMs may exist on one host where they share the physical computer's CPU, hard disk, memory, and network interfaces. |
|
|
Term
|
Definition
The element of virtualization software that manages multiple guest machines and their connections to the host (and by association, to a physical network). A hypervisor is also known as a virtual machine manager. |
|
|
Term
Virtual Network Computing |
|
Definition
An open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. Examples of VNC software include RealVNC, TightVNC, and UltraVNC. |
|
|
Term
virtual network interface card |
|
Definition
A logically defined network interface associated with a virtual machine. |
|
|
Term
|
Definition
A logically constructed WAN that uses existing public transmission systems. VPNs can be created through the use of software or combined software and hardware solutions. This type of network allows an organization to carve out a private WAN through the Internet, serving only its offices, while keeping the data secure and isolated from other (public) traffic. |
|
|
Term
|
Definition
A server that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer. |
|
|
Term
|
Definition
A logically defined device that is created and managed by virtualization software and that operates at the Data Link layer. Ports on a virtual switch connect virtual machines with a network, whether virtual or physical, through the host's physical NIC. |
|
|
Term
|
Definition
A workstation that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer. |
|
|
Term
|
Definition
A virtualization software platform from Oracle. |
|
|
Term
|
Definition
The emulation of a computer, operating system environment, or application on a physical system. |
|
|
Term
|
Definition
(virtual machine)
A computer that exists in emulation on a physical computer, or host machine. Multiple VMs may exist on one host where they share the physical computer's CPU, hard disk, memory, and network interfaces. |
|
|
Term
|
Definition
A vendor that supplies the most popular types of workstation and server virtualization software. Used casually, the term VMware may also refer to the virtualization software distributed by the company. |
|
|
Term
|
Definition
(Virtual Network Computing)
An open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. Examples of VNC software include RealVNC, TightVNC, and UltraVNC. |
|
|
Term
|
Definition
(virtual network interface card)
A logically defined network interface associated with a virtual machine. |
|
|
Term
|
Definition
(virtual private network)
A logically constructed WAN that uses existing public transmission systems. VPNs can be created through the use of software or combined software and hardware solutions. This type of network allows an organization to carve out a private WAN through the Internet, serving only its offices, while keeping the data secure and isolated from other (public) traffic. |
|
|
Term
|
Definition
(Anything as a Service, or Everything as a Service)
A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops. |
|
|
Term
|
Definition
An open source virtualization software platform from Citrix Systems. |
|
|
Term
Which of the following is an advantage to virtualizing many servers in your data center, compared with running each server on a separate physical machine?
a. Virtualization will improve the servers' performance.
b. Virtualization will conserve resources.
c. Virtualization will make administration easier.
d. Virtualization will save software costs. |
|
Definition
|
|
Term
Which of the following applies to virtual machines, no matter what type of virtualization software they are created with?
a. They can only belong to one VLAN.
b. They cannot be addressed by clients on a physical LAN.
c. They cannot be assigned Internet-routable IP addresses.
d. They exist as files on the hard drive of their host. |
|
Definition
|
|
Term
You have created a virtual machine on your workstation so that you can test some new applications. You configured the VM's hard disk space to be dynamically allocated. Which of the following will allocate more space for the VM when it needs it?
a. Virtual switch
b. Virtual adapter
c. Hypervisor
d. Virtual network manager |
|
Definition
|
|
Term
You are running KVM on a Fedora Linux computer and have configured a virtual server to use the bridged networking type. The IP address of your host machine's NIC is 192.168.25.71. Assuming your physical LAN uses DHCP, which of the following addresses is most likely the one assigned to your virtual server?
a. 192.168.25.1
b. 192.168.25.83
c. 192.168.0.0
d. Not enough information to draw a conclusion |
|
Definition
|
|
Term
Which of the following is the default networking type assigned to vNICs in most virtualization programs?
a. Host-only
b. Grouped
c. NAT
d. Bridged |
|
Definition
|
|
Term
You have decided to create four virtual Web servers on a Windows Server 2008 R2 server using Hyper-V R2. Which of the following configuration options would you use to make sure the Web servers are accessible to users across the Internet?
a. Private virtual network
b. Host virtual network
c. External virtual network
d. Internal virtual network |
|
Definition
|
|
Term
You work second shift and share a desktop workstation with your colleagues who work on the first and third shifts. Each of you has a separate virtual machine on the workstation. When your third-shift coworker installs a new program on his VM, it causes the virtual machine's operating system to stop working. What happens as a consequence?
a. Your VM's operating system stops working.
b. The host machine's operating system stops working.
c. Your VM and the host machine work as usual, but performance of all the VMs is compromised.
d. Nothing changes for your VM. |
|
Definition
|
|
Term
Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP addresses?
a. From the host machine's virtualization software
b. From the DHCP server on the physical network
c. From the router on the physical network
d. From another VM on the host machine that's configured to act as a DHCP server |
|
Definition
|
|
Term
Which of the following network configuration types is best used for a company's e-mail server?
a. Host-only
b. Bridged
c. NAT
d. Grouped |
|
Definition
|
|
Term
Which of the following network configuration types prevents VMs from exchanging traffic with nodes other than the workstation they are installed on?
a. Host-only
b. Bridged
c. NAT
d. Grouped |
|
Definition
|
|
Term
You manage a data center for a large ISP that hosts virtual Web and mail servers for many customers. One of your physical servers has four NICs and hosts four mail servers. How many vNICs can you assign to each of the mail servers?
a. 1
b. 2
c. 4
d. It depends on the virtualization software. |
|
Definition
|
|
Term
Because of the functions it performs, each port on a virtual switch can also be considered a _______.
a. Virtual machine
b. Virtual bridge
c. Virtual router
d. Virtual firewall |
|
Definition
|
|
Term
You have created multiple virtual machines on your workstation to test different unified communications programs. You want these machines to be available to your IT colleagues for testing, but you do not want the traffic generated by their use to interfere with routine business LAN traffic. Meanwhile, on another workstation a coworker has installed additional communications programs for review. You decide to create a new VLAN devoted to software evaluation. Where do you add your coworker's virtual machines to the new VLAN?
a. On your host workstation, where you established the new VLAN
b. On the LAN switch, which manages the VLAN
c. On your friend's host workstation, where the virtual machines reside
d. On the LAN router, which directs traffic between VLANs |
|
Definition
|
|
Term
How must a physical NIC be configured so that it can connect its host's VMs to multiple VLANs?
a. As a trunk
b. As a port group
c. As a channel
d. As a team |
|
Definition
|
|
Term
To complete its VPN connection, your computer is using RDP. Which of the following VPN types are you participating in?
a. Site-to-link
b. Site-to-site
c. Link-to-client
d. Client-to-site |
|
Definition
|
|
Term
In which of the following situations would you use RDP?
a. To enable someone else to control your workstation, which is running a Windows operating system
b. To establish a VPN between your home workstation and your office LAN
c. To remotely control a distant workstation that's running a UNIX or Linux operating system
d. To manage a pool of modems available for multiple users to log on to your network from a distance |
|
Definition
|
|
Term
You have decided to set up a VPN between your home and your friend's home so that you can run a private digital telephone line over your DSL connections. Each of you has purchased a small Cisco router for terminating the VPN endpoints. Which of the following protocols could you use to create a tunnel between these two routers?
a. L2TP
b. PPTP
c. PP2T
d. SLIP |
|
Definition
|
|
Term
A VPN is designed to connect 15 film animators and programmers from around the state of California. At the core of the VPN is a router connected to a high-performance server used for storing the animation files. The server and router are housed in an ISP's data center. The ISP provides two different T3 connections to the Internet backbone. What type of connection must each of the animators and programmers have to access the VPN?
a. At least a fractional T1 connection to the Internet
b. At least a T1 connection to the Internet
c. At least a T3 connection to the Internet
d. Any type of Internet connection |
|
Definition
|
|
Term
Which of the following functions makes VPN protocols unique?
a. The ability to precisely time packet delivery
b. The ability to interpret both frames and datagrams
c. The ability to create tunnels
d. The ability to detect eavesdropping |
|
Definition
|
|
Term
As a business owner, you have decided to outsource all of your company's IT services to a cloud computing service provider. How can your clients and employees access these services?
a. From a smartphone using cellular signals
b. From a desktop workstation attached to a DSL Internet connection
c. From a server at an office overseas, using a T1
d. All of the above |
|
Definition
|
|