Chapter 10
a. network controller b. network controller
All of these virtual devices, services, and appliances (images) can be centrally managed by a [a]. A [b] is also another word for a device's NIC or network adapter.
NAT mode
In [a], the VM obtains IP addressing information from its host, rather that a server or router on the physical network. To accompish this, the virtualization software acts as a DHCP server.
virtualization
In the case of a network, [a] can emulate hardware, including cabling and network devices (switches or routers), and software, including the NOS and network management systems.
virtualization
In the case of a single computer, [a] can emulate the hardware, OS, and/or applications.
VLAN hopping attack
A _________________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.
a. routers b. router
A subnet groups IP addresses so that [a] can be introduced into a large network in order to segment it into smaller networks. By contrast, a VLAN groups ports on a switch so that some of the local traffic on the switch is force to go through a [b].
default VLAN
A switch is typically preconfigured with one _______________ that includes all its ports.
VLAN
A switch is typically preconfigured with one default [a] that includes all its ports. It cannot be renamed or deleted.
a. unmanaged b. managed
An [a] switch has no IP address assigned to it. [b] switches can be configured via a command-line interface and usually are assigned IP addresses.
bridged mode
In [a], a vNIC accesses a physical network using the host machine's NIC.
a. Data Link b. MAC
Just like a physical NIC, a vNIC operates at the [a] layer (give name) and provides the computer with network access. Upon creation, each vNIC is automatically assigned a [b] address.
VLAN
One broadcast domain = One [a] = One subnet
1. Enhance security 2. Improve performance 3. Simplify troubleshooting
Provide three reasons why a network administrator might separate traffic. A network administrator might separate traffic to accomplish the following: 1. 2. 3.
a. console b. SSH
Some switches can be managed by connecting a laptop to the switch's [a] port. Other management options include telnetting into the switch or accessing the switch by [b].
Spanning Tree Protocol
TRILL and SPB are two standards that have been developed to replace the [a].
hypervisor
The software that allows you to define VMs and manages resource allocation and sharing among them is know as a virtual machine manager or a [a].
VMware
[a] makes the most widely implemented virtualization software today.