Filters
Question type

Study Flashcards

____ is the most widely implemented virtualization software today.


A) Hyper-V
B) Citrix
C) VirtualBox
D) VMware

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What are two important considerations when designing a VPN?

Correct Answer

verifed

verified

Two important consid...

View Answer

In the case of dial-up networking, the term ____ refers to a modem.


A) serial connection
B) virtual connection
C) physical connection
D) POTS connection

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network.

Correct Answer

verifed

verified

____ is the remote virtual computing software that comes with Windows client and server operating systems.


A) Remote Server
B) Remote Client
C) Remote Windows
D) Remote Desktop

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Describe PPPoE.

Correct Answer

verifed

verified

When PPP is used over an Ethernet networ...

View Answer

____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.


A) Remote Desktop
B) VNC
C) Citrix
D) Xen

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

PPTP and L2TP are the only protocols that can be used to carry VPN traffic.

A) True
B) False

Correct Answer

verifed

verified

____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host's operating system.


A) Host-only
B) NAT
C) Bridged
D) Blocked

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

List two potential disadvantages to create multiple guests on a single host machine.

Correct Answer

verifed

verified

Compromised performance-When multiple vi...

View Answer

Describe how remote virtual computing is used.

Correct Answer

verifed

verified

Remote virtual computing allow...

View Answer

In a(n) ____________________ VPN, clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.

Correct Answer

verifed

verified

Describe the purpose of RRAS and how it is used.

Correct Answer

verifed

verified

RRAS (Routing and Remote Access Service)...

View Answer

A ____ uses very little hard disk space or processing power from the workstation on which it is installed.


A) thick client
B) fat client
C) thin client
D) virtual client

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

In bridged mode, a(n) ____________________ accesses a physical network using the host machine's NIC.

Correct Answer

verifed

verified

A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.

A) True
B) False

Correct Answer

verifed

verified

Using a virtualization program, you can create dozens of different VMs.

A) True
B) False

Correct Answer

verifed

verified

Upon creation, each vNIC is automatically assigned a ____.


A) MAC address
B) switch address
C) block address
D) reference address

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Where do virtual switches or bridges and their configuration reside?

Correct Answer

verifed

verified

Virtual switches or bridges re...

View Answer

A(n) ____________________ is a logically defined device that operates at the Data Link layer to pass frames between nodes.

Correct Answer

verifed

verified

Showing 21 - 40 of 42

Related Exams

Show Answer