Term
|
Definition
Emulation of a computer, operating system environment, or application on a physical system. |
|
|
Term
|
Definition
Share single CPU, hard drive, memory. or can be can be configured to use different CPU's or NIC's. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Virtual Machine Manager or Hypervisor |
|
Definition
Software that allows you to define and manage resources allocation and sharing among them. |
|
|
Term
Advantages of Virtualization |
|
Definition
Efficient of resources Cost and Energy Savings Fault and threat Isolation Simple backups, recovery, and replication |
|
|
Term
Disadvantages of Virtualization |
|
Definition
Compromised Performance Increased complexity Increased Licensing costs Single Point of Failure |
|
|
Term
Most potential disadvantage |
|
Definition
Mitigated through thoughtful network design and virtualization control. |
|
|
Term
|
Definition
Exist as files on the hard disk of the physical computer, These files contain the operating system, applications, data, and configuration |
|
|
Term
|
Definition
|
|
Term
Required to connect to a network a virtual machine requires |
|
Definition
|
|
Term
|
Definition
Logically defined device that operates at the data link layer |
|
|
Term
Virtual Switches reside in the _____of the physical computers that act as their hosts. |
|
Definition
|
|
Term
Virtual Switches configuration reside in______ |
|
Definition
separate file on the hosts hard disk. |
|
|
Term
What controls the Virtual switches? |
|
Definition
|
|
Term
Most frequently used network connection types |
|
Definition
|
|
Term
|
Definition
vNIC accesses a physical network using the host machine's NIC and obtains it own IP address, default gateway, and netmask from a DHCP server on the physical LAN. |
|
|
Term
In Bridged Mode a VM appears to other nodes as just another____on the network. |
|
Definition
|
|
Term
Bridged Mode is best used for |
|
Definition
specific address mail servers web servers |
|
|
Term
|
Definition
VM relies on on the host machine to act as a NAT device. |
|
|
Term
NAT networking mode is appropriate for clients that_________ to be addressed directly and at a specific address by other sides. |
|
Definition
|
|
Term
Host-Only networking mode |
|
Definition
VM's on one host can exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host to create an isolated, all virtual network. |
|
|
Term
Popular uses for virtual appliances |
|
Definition
Firewall and other security measures network management email solutions remote access |
|
|
Term
|
Definition
Subnets logically defined on a physical switch that allow network administrators to separate network traffic for better performance, customized address management, and security. |
|
|
Term
To add VM's to a VLAN defined on a physical network, you modify a ___ |
|
Definition
virtual switch configuration. |
|
|
Term
VM's are ______added to preexisting VLAN on the physical switch that manages that VLAN. |
|
Definition
|
|
Term
|
Definition
You can construct a WAN from existing public transmission systems. This offers connectivity only to an organization's users, while keeping the data secure and isolated from other (public) traffic. To accomplish this. This may be software or hardware based. Depend on secure protocols and transmission methods to keep data private. |
|
|
Term
|
Definition
Flexible provision of data storage applications or services to multiple clients over a network
Consolidates resources Elastic metered, measured Available on demand |
|
|
Term
|
Definition
Services that go beyond networking Monitoring Storage Application Virtual desktops |
|
|
Term
|
Definition
Technology developed by Cisco Used by many different vendors can connect a VPN with a mix of equipment Juniper router or a Cisco router Can connect two routers, a router and a remote access server, or a client and a remote access server. |
|
|
Term
Two major types of protocols used with VPN's |
|
Definition
|
|
Term
A VPN tunneling protocol operates______ at the and encapsulates_______ , no matter what network layer protocol is used. |
|
Definition
data link layer network layer packets |
|
|
Term
|
Definition
Tunnels connect multiple sites on a WAN, Clients and servers do not have to run special VPN software |
|
|
Term
|
Definition
Clients, servers, and other hosts establish tunnels with a private network using RAS, Must run on special VPN software to create the tunnel for and encrypt and encapsulate data. |
|
|