A+ Chapter 14 Review
___ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.
Virtual
Cut-through switches can detect corrupt packets.
False
It is best to perform connectivity tests on a computer connected to a live network.
False
The Software required to establish VPNs is usually expensive
False
Explain why network engineers value VLANs. Include a discussion on reasons for using VLANs.
Flexibility ~ ports from more than one switch
To install a NIC, you must first install the ____.
Hardware
In addition to viewing its LEDs and using a loopback plug to test a NIC's functionality, you can also check a NIC's connectivity with ____.
Simple commands
VPNs can be classified based on the kinds of ____ they connect.
endpoints
On a Linux workstation, a popular utility called ____________________ allows you to view and change NIC settings.
ethtool
______________ is a combination of networking hardware and software that connects two dissimilar kinds of networks.
gateway
Each VM is known as a ____.
guest
The physical computer on a virtual machine is known as a _
host
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device
host machine
A hardware component that can be changed without disrupting operations is known as ____.
hot-Swappable
PCIe slots vary depending on the number of ______ they support
lanes
A(n) _______ NIC is integrated into the motherboard.
on-board
Describe how a bridge translates between two segment types.
A bridge reads the MAC address and decides whether to forwards or filter
A computer's ______ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC.
Bus
Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.
Content
Traditional switches operate at the ____ layer of the OSI model.
Data link
A(n) __ is software that enables an attached device to communicate with the computer's operating system.
Device Driver
____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network
Dial-up networking
CompactFlash is an example of a peripheral device attached to the computer's ____ bus.
External
____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.
Host-only
A ____ is a repeater with more than one output port.
Hub
At its most primitive, a ____ is a repeater with more than one output port.
Hub
A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) _______ router.
Interior
Upon creation, each vNIC is automatically assigned a ____.
MAC address
By far, the most popular expansion board NIC today is one that uses a(n) ____ bus.
PCIe
In ____, each datagram can follow one of many paths to reach its destination.
Packet switching
Repeaters operate in the ____ layer of the OSI model.
Physical
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.
RAM
____ is the remote virtual computing software that comes with Windows client and server operating systems.
Remote desktop
To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.
STP (Spanning Tree Protocol)
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
Static
Advances in NIC technology are making this hardware smarter than ever
True
Bridges are protocol independent
True
In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers.
True
Most cloud service providers use virtualization software to supply multiple platforms to multiple users
True
Using a virtualization program, you can create dozen of different VMs
True
Switches can create ____ by grouping a number of ports into a broadcast domain.
VLANS
The software that allows you to define VMs and manages resource allocation and sharing among them is known as a _______.
VM Manager
____ is the most widely implemented virtualization software today.
VMware
____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
VNC
____ are wide area networks that are logically defined over public transmission systems.
VPNs
When a server compares a user's credentials with those in its database, the process is known as ____.
authentication
A ____ can interpret physical addressing information
bridge
Buses differ according to their ____.
capacity
In a _______ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.
client-to-site
On network diagrams, the Internet is frequently depicted as a ____.
cloud
______ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.
cloud computing
list two potential disadvantages to create multiple guests on a single host machine?
comprised performance, increased complexity
what two important considerations when designing a VPN?
configuring the firewall, installing certificates
A VPN tunneling protocol operates at the ____ layer.
data link
NICs contain a(n) ____, which transmits and receives data signals.
data transceiver
A ____ is a multiport connectivity device that directs data between nodes on a network.
router
what are three advantages of virtualization?
save energy, reduce data center footprint, reduce hardware lock-in
In the case of dial-up networking, the term ____ refers to a modem.
serial connection
In a ____ VPN, tunnels connect multiple sites on a WAN.
site-to-site
A ____ uses very little hard disk space or processing power from the workstation on which it is installed.
thin client
In bridged mode, a _______ accesses a physical network using the host machine's NIC.
vNIC
To connect to a network, a virtual machine requires a ____.
virtual adapter
connect vNICs with a network, whether virtual or physical.
virtual bridges
A _______ is a logically defined device that operates at the Data Link layer to pass frames between nodes.
virtual switch
where do virtual switches or bridges and their configuration reside?
virtual switches or bridges reside in RAM while configuration is in a separate file on the host's hard drive.
List two things that distinguish cloud computing?
~ It holds in an more secure server than HDD ~ Usually costs money to store 10 gigabytes of data
Describe two popular types of gateways.
~E-mail gateway— A gateway that translates messages from one type of e-mail system to another. ~Firewall— A gateway that selectively blocks or filters traffic between networks.