Chapter 10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

a. network controller b. network controller

All of these virtual devices, services, and appliances (images) can be centrally managed by a [a]. A [b] is also another word for a device's NIC or network adapter.

NAT mode

In [a], the VM obtains IP addressing information from its host, rather that a server or router on the physical network. To accompish this, the virtualization software acts as a DHCP server.

virtualization

In the case of a network, [a] can emulate hardware, including cabling and network devices (switches or routers), and software, including the NOS and network management systems.

virtualization

In the case of a single computer, [a] can emulate the hardware, OS, and/or applications.

VLAN hopping attack

A _________________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.​

a. routers b. router

A subnet groups IP addresses so that [a] can be introduced into a large network in order to segment it into smaller networks. By contrast, a VLAN groups ports on a switch so that some of the local traffic on the switch is force to go through a [b].

default VLAN

A switch is typically preconfigured with one _______________ that includes all its ports.

VLAN

A switch is typically preconfigured with one default [a] that includes all its ports. It cannot be renamed or deleted.

a. unmanaged b. managed

An [a] switch has no IP address assigned to it. [b] switches can be configured via a command-line interface and usually are assigned IP addresses.

bridged mode

In [a], a vNIC accesses a physical network using the host machine's NIC.

a. Data Link b. MAC

Just like a physical NIC, a vNIC operates at the [a] layer (give name) and provides the computer with network access. Upon creation, each vNIC is automatically assigned a [b] address.

VLAN

One broadcast domain = One [a] = One subnet

1. Enhance security 2. Improve performance 3. Simplify troubleshooting

Provide three reasons why a network administrator might separate traffic.​ ​A network administrator might separate traffic to accomplish the following: 1. 2. 3.

a. console b. SSH

Some switches can be managed by connecting a laptop to the switch's [a] port. Other management options include telnetting into the switch or accessing the switch by [b].

Spanning Tree Protocol

TRILL and SPB are two standards that have been developed to replace the [a].

hypervisor

The software that allows you to define VMs and manages resource allocation and sharing among them is know as a virtual machine manager or a [a].

VMware

[a] makes the most widely implemented virtualization software today.


संबंधित स्टडी सेट्स

SPC 3301 Communication and Goals

View Set

The Functions of the Plasma Membrane

View Set

OS - Disk Scheduling / Management

View Set

Combo with Amsco APUSH Chapter 19 +18 and 1 other

View Set

Budowa i działanie narządu wzroku

View Set

Taylor's Fundametnals PrepU Ch. 45 Sensory Functioning

View Set

U.S. Government Final Exam review

View Set

Workforce Planning & Employment section 2-7

View Set

Microbiology Chapter 9 Physical and Chemical Control of Microbes

View Set