Chapter 10

Ace your homework & exams now with Quizwiz!

a. network controller b. network controller

All of these virtual devices, services, and appliances (images) can be centrally managed by a [a]. A [b] is also another word for a device's NIC or network adapter.

NAT mode

In [a], the VM obtains IP addressing information from its host, rather that a server or router on the physical network. To accompish this, the virtualization software acts as a DHCP server.

virtualization

In the case of a network, [a] can emulate hardware, including cabling and network devices (switches or routers), and software, including the NOS and network management systems.

virtualization

In the case of a single computer, [a] can emulate the hardware, OS, and/or applications.

VLAN hopping attack

A _________________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.​

a. routers b. router

A subnet groups IP addresses so that [a] can be introduced into a large network in order to segment it into smaller networks. By contrast, a VLAN groups ports on a switch so that some of the local traffic on the switch is force to go through a [b].

default VLAN

A switch is typically preconfigured with one _______________ that includes all its ports.

VLAN

A switch is typically preconfigured with one default [a] that includes all its ports. It cannot be renamed or deleted.

a. unmanaged b. managed

An [a] switch has no IP address assigned to it. [b] switches can be configured via a command-line interface and usually are assigned IP addresses.

bridged mode

In [a], a vNIC accesses a physical network using the host machine's NIC.

a. Data Link b. MAC

Just like a physical NIC, a vNIC operates at the [a] layer (give name) and provides the computer with network access. Upon creation, each vNIC is automatically assigned a [b] address.

VLAN

One broadcast domain = One [a] = One subnet

1. Enhance security 2. Improve performance 3. Simplify troubleshooting

Provide three reasons why a network administrator might separate traffic.​ ​A network administrator might separate traffic to accomplish the following: 1. 2. 3.

a. console b. SSH

Some switches can be managed by connecting a laptop to the switch's [a] port. Other management options include telnetting into the switch or accessing the switch by [b].

Spanning Tree Protocol

TRILL and SPB are two standards that have been developed to replace the [a].

hypervisor

The software that allows you to define VMs and manages resource allocation and sharing among them is know as a virtual machine manager or a [a].

VMware

[a] makes the most widely implemented virtualization software today.


Related study sets

SPC 3301 Communication and Goals

View Set

The Functions of the Plasma Membrane

View Set

OS - Disk Scheduling / Management

View Set

Combo with Amsco APUSH Chapter 19 +18 and 1 other

View Set

Budowa i działanie narządu wzroku

View Set

Taylor's Fundametnals PrepU Ch. 45 Sensory Functioning

View Set

U.S. Government Final Exam review

View Set

Workforce Planning & Employment section 2-7

View Set

Microbiology Chapter 9 Physical and Chemical Control of Microbes

View Set