A+ Chapter 14 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

___ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.

Virtual

Cut-through switches can detect corrupt packets.

False

It is best to perform connectivity tests on a computer connected to a live network.

False

The Software required to establish VPNs is usually expensive

False

Explain why network engineers value VLANs. Include a discussion on reasons for using VLANs.

Flexibility ~ ports from more than one switch

To install a NIC, you must first install the ____.

Hardware

In addition to viewing its LEDs and using a loopback plug to test a NIC's functionality, you can also check a NIC's connectivity with ____.

Simple commands

VPNs can be classified based on the kinds of ____ they connect.

endpoints

On a Linux workstation, a popular utility called ____________________ allows you to view and change NIC settings.

ethtool

______________ is a combination of networking hardware and software that connects two dissimilar kinds of networks.

gateway

Each VM is known as a ____.

guest

The physical computer on a virtual machine is known as a _

host

In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device

host machine

A hardware component that can be changed without disrupting operations is known as ____.

hot-Swappable

PCIe slots vary depending on the number of ______ they support

lanes

A(n) _______ NIC is integrated into the motherboard.

on-board

Describe how a bridge translates between two segment types.

A bridge reads the MAC address and decides whether to forwards or filter

A computer's ______ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computer's components, including its memory, processor, hard disk, and NIC.

Bus

Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.

Content

Traditional switches operate at the ____ layer of the OSI model.

Data link

A(n) __ is software that enables an attached device to communicate with the computer's operating system.

Device Driver

____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network

Dial-up networking

CompactFlash is an example of a peripheral device attached to the computer's ____ bus.

External

____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.

Host-only

A ____ is a repeater with more than one output port.

Hub

At its most primitive, a ____ is a repeater with more than one output port.

Hub

A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) _______ router.

Interior

Upon creation, each vNIC is automatically assigned a ____.

MAC address

By far, the most popular expansion board NIC today is one that uses a(n) ____ bus.

PCIe

In ____, each datagram can follow one of many paths to reach its destination.

Packet switching

Repeaters operate in the ____ layer of the OSI model.

Physical

Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.

RAM

____ is the remote virtual computing software that comes with Windows client and server operating systems.

Remote desktop

To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

STP (Spanning Tree Protocol)

____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.

Static

Advances in NIC technology are making this hardware smarter than ever

True

Bridges are protocol independent

True

In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers.

True

Most cloud service providers use virtualization software to supply multiple platforms to multiple users

True

Using a virtualization program, you can create dozen of different VMs

True

Switches can create ____ by grouping a number of ports into a broadcast domain.

VLANS

The software that allows you to define VMs and manages resource allocation and sharing among them is known as a _______.

VM Manager

____ is the most widely implemented virtualization software today.

VMware

____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.

VNC

____ are wide area networks that are logically defined over public transmission systems.

VPNs

When a server compares a user's credentials with those in its database, the process is known as ____.

authentication

A ____ can interpret physical addressing information

bridge

Buses differ according to their ____.

capacity

In a _______ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.

client-to-site

On network diagrams, the Internet is frequently depicted as a ____.

cloud

______ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.

cloud computing

list two potential disadvantages to create multiple guests on a single host machine?

comprised performance, increased complexity

what two important considerations when designing a VPN?

configuring the firewall, installing certificates

A VPN tunneling protocol operates at the ____ layer.

data link

NICs contain a(n) ____, which transmits and receives data signals.

data transceiver

A ____ is a multiport connectivity device that directs data between nodes on a network.

router

what are three advantages of virtualization?

save energy, reduce data center footprint, reduce hardware lock-in

In the case of dial-up networking, the term ____ refers to a modem.

serial connection

In a ____ VPN, tunnels connect multiple sites on a WAN.

site-to-site

A ____ uses very little hard disk space or processing power from the workstation on which it is installed.

thin client

In bridged mode, a _______ accesses a physical network using the host machine's NIC.

vNIC

To connect to a network, a virtual machine requires a ____.

virtual adapter

connect vNICs with a network, whether virtual or physical.

virtual bridges

A _______ is a logically defined device that operates at the Data Link layer to pass frames between nodes.

virtual switch

where do virtual switches or bridges and their configuration reside?

virtual switches or bridges reside in RAM while configuration is in a separate file on the host's hard drive.

List two things that distinguish cloud computing?

~ It holds in an more secure server than HDD ~ Usually costs money to store 10 gigabytes of data

Describe two popular types of gateways.

~E-mail gateway— A gateway that translates messages from one type of e-mail system to another. ~Firewall— A gateway that selectively blocks or filters traffic between networks.


Conjuntos de estudio relacionados

Chapter 2 Quiz - Electrophysiology

View Set

Raines Semester 2 Exam Quotations (please correct if my answers are wrong)

View Set

Medical Terminology - Module 11: Cardiovascular System

View Set

Chapter 16: Introduction to IP Multicasting

View Set

PA Pediatric EOR, Pediatrics all q

View Set

MKT 300 Ch 15-17 MindTap Practices

View Set