Shared Flashcard Set

Details

Chapter 10
Virtual Networks and Remote Access
84
Computer Networking
Undergraduate 1
06/27/2016

Additional Computer Networking Flashcards

 


 

Cards

Term
Anything as a Service
Definition
A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Term
authentication
Definition
The process of comparing and matching a client's credentials with the credentials in the NOS user database to enable the client to log on to the network.
Term
client-to-site VPN
Definition
A type of VPN in which clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway. Each client on a client-to-site VPN must run VPN software to create the tunnel for, and encrypt and encapsulate data.
Term
cloud computing
Definition
The flexible provision of data storage, applications, or services to multiple clients over a network. Cloud computing consolidates resources and is elastic, metered, self-service, multiplatform, and available on demand.
Term
credentials
Definition
A user's unique identifying characteristics that enable him to authenticate with a server and gain access to network resources. The most common credentials are a username and a password.
Term
dial-up networking
Definition
The process of dialing into a remote access server to connect with a network, be it private or public.
Term
elastic
Definition
A characteristic of cloud computing that means services can be quickly and dynamically—sometimes even automatically—scaled up or down.
Term
Everything as a Service
Definition
A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Term
guest
Definition
In the context of virtualization, a virtual machine operated and managed by a virtualization program.
Term
host
Definition
In the context of virtualization, the physical computer on which virtualization software operates and manages guests.
Term
Hyper-V
Definition
Microsoft's virtualization software package. Hyper-V operates with Windows Server 2008 and Windows Server 2008 R2.
Term
hypervisor
Definition
The element of virtualization software that manages multiple guest machines and their connections to the host (and by association, to a physical network). A hypervisor is also known as a virtual machine manager.
Term
ICA (Independent Computing Architecture)
Definition
The software from Citrix Systems, Inc., that, when installed on a client, enables the client to connect with a host computer and exchange keystrokes, mouse clicks, and screen updates. Citrix's ICA client can work with virtually any operating system or application.
Term
Kernel-based Virtual Machine
Definition
An open source virtualization package designed for use with Linux systems.
Term
KVM
Definition
(Kernel-based Virtual Machine)

An open source virtualization package designed for use with Linux systems.
Term
L2TP
Definition
(Layer 2 Tunneling Protocol)
A protocol that encapsulates PPP data, for use on VPNs. L2TP is based on Cisco technology and is standardized by the IETF. It is distinguished by its compatibility among different manufacturers' equipment; its ability to connect between clients, routers, and servers alike; and also by the fact that it can connect nodes belonging to different Layer 3 networks.
Term
Layer 2 Tunneling Protocol
Definition
A protocol that encapsulates PPP data, for use on VPNs. L2TP is based on Cisco technology and is standardized by the IETF. It is distinguished by its compatibility among different manufacturers' equipment; its ability to connect between clients, routers, and servers alike; and also by the fact that it can connect nodes belonging to different Layer 3 networks.
Term
multitenant
Definition
A feature of cloud computing in which multiple customers share storage locations or services without knowing it.
Term
NaaS
Definition
(Network as a Service)

A type of cloud computing that offers clients a complete set of networking services—for example, mail, Web, DNS, DHCP, and remote access services, plus LAN and WAN connectivity.
Term
Network as a Service
Definition
A type of cloud computing that offers clients a complete set of networking services—for example, mail, Web, DNS, DHCP, and remote access services, plus LAN and WAN connectivity.
Term
open source
Definition
The term that describes software whose code is publicly available for use and modification.
Term
Point-to-Point Protocol
Definition
A communications protocol that enables a workstation to connect to a server using a serial connection. PPP can support multiple Network layer protocols and can use both asynchronous and synchronous communications. It performs compression and error correction and requires little configuration on the client workstation.
Term
Point-to-Point Protocol over Ethernet
Definition
PPP running over an Ethernet network.
Term
Point-to-Point Tunneling Protocol   S
Definition
A Layer 2 protocol developed by Microsoft that encapsulates PPP data for transmission over VPN connections. PPTP operates with Windows RRAS access services and can accept connections from multiple different clients. It is simple, but less secure than other modern tunneling protocols.
Term
PPP
Definition
(Point-to-Point Protocol)

 A communications protocol that enables a workstation to connect to a server using a serial connection. PPP can support multiple Network layer protocols and can use both asynchronous and synchronous communications. It performs compression and error correction and requires little configuration on the client workstation.
Term
PPPoE
Definition
(Point-to-Point Protocol over Ethernet)

PPP running over an Ethernet network.
Term
PPTP
Definition
(Point-to-Point Tunneling Protocol)

 A Layer 2 protocol developed by Microsoft that encapsulates PPP data for transmission over VPN connections. PPTP operates with Windows RRAS access services and can accept connections from multiple different clients. It is simple, but less secure than other modern tunneling protocols.
Term
private cloud
Definition
An arrangement in which shared and flexible data storage, applications, or services are managed on and delivered via an organization's internal network.
Term
public cloud
Definition
An arrangement in which shared and flexible data storage, applications, or services are managed centrally by service providers and delivered over public transmission lines, such as the Internet. Rackspace and Amazon (with its EC2 offering) are leading public cloud service providers.
Term
RAS
Definition
(Remote Access Service)

The dial-up networking software provided with Microsoft Windows 95, 98, NT, and 2000 client operating systems. RAS requires software installed on both the client and server, a server configured to accept incoming clients, and a client with sufficient privileges (including username and password) on the server to access its resources. In more recent versions of Windows, RAS has been incorporated into the RRAS (Routing and Remote Access Service).
Term
RDP
Definition
(Remote Desktop Protocol)

An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. RDP also carries session, licensing, and encryption information.
Term
remote access
Definition
A method for connecting and logging on to a LAN from a workstation that is remote, or not physically connected, to the LAN.
Term
Remote Access Service
Definition
The dial-up networking software provided with Microsoft Windows 95, 98, NT, and 2000 client operating systems. RAS requires software installed on both the client and server, a server configured to accept incoming clients, and a client with sufficient privileges (including username and password) on the server to access its resources. In more recent versions of Windows, RAS has been incorporated into the RRAS (Routing and Remote Access Service).
Term
Remote Desktop
Definition
A feature of Windows operating systems that allows a computer to act as a remote host and be controlled from a client running another Windows operating system.
Term
Remote Desktop Protocol
Definition
An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. RDP also carries session, licensing, and encryption information.
Term
Routing and Remote Access Service
Definition
The software included with Windows operating systems that enables a server to act as a router, firewall, and remote access server. Using RRAS, a server can provide network access to multiple remote clients.
Term
RRAS
Definition
(Routing and Remote Access Service )

The software included with Windows operating systems that enables a server to act as a router, firewall, and remote access server. Using RRAS, a server can provide network access to multiple remote clients.
Term
Serial Line Internet Protocol
Definition
A communications protocol that enables a workstation to connect to a server using a serial connection. SLIP can support only asynchronous communications and IP traffic and requires some configuration on the client workstation. SLIP has been made obsolete by PPP.
Term
site-to-site VPN
Definition
A type of VPN in which VPN gateways at multiple sites encrypt and encapsulate data to exchange over a tunnel with other VPN gateways. Meanwhile, clients, servers, and other hosts on a site-to-site VPN communicate with the VPN gateway.
Term
SLIP
Definition
(Serial Line Internet Protocol)

A communications protocol that enables a workstation to connect to a server using a serial connection. SLIP can support only asynchronous communications and IP traffic and requires some configuration on the client workstation. SLIP has been made obsolete by PPP.
Term
thin client
Definition
A client that relies on another host for the majority of processing and hard disk resources necessary to run applications and share files over the network.
Term
tunnel
Definition
A secured, virtual connection between two nodes on a VPN.
Term
tunneling
Definition
The process of encapsulating one type of protocol in another. Tunneling is the way in which higher-layer data is transported over VPNs by Layer 2 protocols.
Term
virtual adapter
Definition
A logically defined network interface associated with a virtual machine.
Term
virtual appliance
Definition
An image that includes the appropriate operating system, software, hardware specifications, and application configuration necessary for a prepackaged solution to run properly on a virtual machine.
Term
virtual bridge
Definition
An interface connecting a vNIC with a virtual or physical network, or a port on a virtual switch.
Term
virtual desktop
Definition
A desktop operating environment that is hosted virtually, on a different physical computer from the one the user interacts with.
Term
virtual machine
Definition
A computer that exists in emulation on a physical computer, or host machine. Multiple VMs may exist on one host where they share the physical computer's CPU, hard disk, memory, and network interfaces.
Term
virtual machine manager
Definition
The element of virtualization software that manages multiple guest machines and their connections to the host (and by association, to a physical network). A hypervisor is also known as a virtual machine manager.
Term
Virtual Network Computing
Definition
An open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. Examples of VNC software include RealVNC, TightVNC, and UltraVNC.
Term
virtual network interface card
Definition
A logically defined network interface associated with a virtual machine.
Term
virtual private network
Definition
A logically constructed WAN that uses existing public transmission systems. VPNs can be created through the use of software or combined software and hardware solutions. This type of network allows an organization to carve out a private WAN through the Internet, serving only its offices, while keeping the data secure and isolated from other (public) traffic.
Term
virtual server
Definition
A server that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.
Term
virtual switch
Definition
A logically defined device that is created and managed by virtualization software and that operates at the Data Link layer. Ports on a virtual switch connect virtual machines with a network, whether virtual or physical, through the host's physical NIC.
Term
virtual workstation
Definition
A workstation that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.
Term
VirtualBox
Definition
A virtualization software platform from Oracle.
Term
virtualization
Definition
The emulation of a computer, operating system environment, or application on a physical system.
Term
VM
Definition
(virtual machine)

A computer that exists in emulation on a physical computer, or host machine. Multiple VMs may exist on one host where they share the physical computer's CPU, hard disk, memory, and network interfaces.
Term
VMware
Definition
A vendor that supplies the most popular types of workstation and server virtualization software. Used casually, the term VMware may also refer to the virtualization software distributed by the company.
Term
VNC
Definition
(Virtual Network Computing)

An open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. Examples of VNC software include RealVNC, TightVNC, and UltraVNC.
Term
vNIC
Definition
(virtual network interface card)

A logically defined network interface associated with a virtual machine.
Term
VPN
Definition
(virtual private network)

A logically constructed WAN that uses existing public transmission systems. VPNs can be created through the use of software or combined software and hardware solutions. This type of network allows an organization to carve out a private WAN through the Internet, serving only its offices, while keeping the data secure and isolated from other (public) traffic.
Term
XaaS
Definition
(Anything as a Service, or Everything as a Service)

 A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.
Term
Xen
Definition
An open source virtualization software platform from Citrix Systems.
Term
Which of the following is an advantage to virtualizing many servers in your data center, compared with running each server on a separate physical machine?

a. Virtualization will improve the servers' performance.

b. Virtualization will conserve resources.

c. Virtualization will make administration easier.

d. Virtualization will save software costs.
Definition
Term
Which of the following applies to virtual machines, no matter what type of virtualization software they are created with?

a. They can only belong to one VLAN.

b. They cannot be addressed by clients on a physical LAN.

c. They cannot be assigned Internet-routable IP addresses.

d. They exist as files on the hard drive of their host.
Definition
Term
You have created a virtual machine on your workstation so that you can test some new applications. You configured the VM's hard disk space to be dynamically allocated. Which of the following will allocate more space for the VM when it needs it?

a. Virtual switch

b. Virtual adapter

c. Hypervisor

d. Virtual network manager
Definition
Term
You are running KVM on a Fedora Linux computer and have configured a virtual server to use the bridged networking type. The IP address of your host machine's NIC is 192.168.25.71. Assuming your physical LAN uses DHCP, which of the following addresses is most likely the one assigned to your virtual server?

a. 192.168.25.1

b. 192.168.25.83

c. 192.168.0.0

d. Not enough information to draw a conclusion
Definition
Term
Which of the following is the default networking type assigned to vNICs in most virtualization programs?

a. Host-only

b. Grouped

c. NAT

d. Bridged
Definition
Term
You have decided to create four virtual Web servers on a Windows Server 2008 R2 server using Hyper-V R2. Which of the following configuration options would you use to make sure the Web servers are accessible to users across the Internet?

a. Private virtual network

b. Host virtual network

c. External virtual network

d. Internal virtual network
Definition
Term
You work second shift and share a desktop workstation with your colleagues who work on the first and third shifts. Each of you has a separate virtual machine on the workstation. When your third-shift coworker installs a new program on his VM, it causes the virtual machine's operating system to stop working. What happens as a consequence?

a. Your VM's operating system stops working.

b. The host machine's operating system stops working.

c. Your VM and the host machine work as usual, but performance of all the VMs is compromised.

d. Nothing changes for your VM.
Definition
Term
Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP addresses?

a. From the host machine's virtualization software

b. From the DHCP server on the physical network

c. From the router on the physical network

d. From another VM on the host machine that's configured to act as a DHCP server
Definition
Term
Which of the following network configuration types is best used for a company's e-mail server?

a. Host-only

b. Bridged

c. NAT

d. Grouped
Definition
Term
Which of the following network configuration types prevents VMs from exchanging traffic with nodes other than the workstation they are installed on?

a. Host-only

b. Bridged

c. NAT

d. Grouped
Definition
Term
You manage a data center for a large ISP that hosts virtual Web and mail servers for many customers. One of your physical servers has four NICs and hosts four mail servers. How many vNICs can you assign to each of the mail servers?

a. 1

b. 2

c. 4

d. It depends on the virtualization software.
Definition
Term
Because of the functions it performs, each port on a virtual switch can also be considered a _______.

a. Virtual machine

b. Virtual bridge

c. Virtual router

d. Virtual firewall
Definition
Term
You have created multiple virtual machines on your workstation to test different unified communications programs. You want these machines to be available to your IT colleagues for testing, but you do not want the traffic generated by their use to interfere with routine business LAN traffic. Meanwhile, on another workstation a coworker has installed additional communications programs for review. You decide to create a new VLAN devoted to software evaluation. Where do you add your coworker's virtual machines to the new VLAN?

a. On your host workstation, where you established the new VLAN

b. On the LAN switch, which manages the VLAN

c. On your friend's host workstation, where the virtual machines reside

d. On the LAN router, which directs traffic between VLANs
Definition
Term
How must a physical NIC be configured so that it can connect its host's VMs to multiple VLANs?

a. As a trunk

b. As a port group

c. As a channel

d. As a team
Definition
Term
To complete its VPN connection, your computer is using RDP. Which of the following VPN types are you participating in?

a. Site-to-link

b. Site-to-site

c. Link-to-client

d. Client-to-site
Definition
Term
In which of the following situations would you use RDP?

a. To enable someone else to control your workstation, which is running a Windows operating system

b. To establish a VPN between your home workstation and your office LAN

c. To remotely control a distant workstation that's running a UNIX or Linux operating system

d. To manage a pool of modems available for multiple users to log on to your network from a distance
Definition
Term
You have decided to set up a VPN between your home and your friend's home so that you can run a private digital telephone line over your DSL connections. Each of you has purchased a small Cisco router for terminating the VPN endpoints. Which of the following protocols could you use to create a tunnel between these two routers?

a. L2TP

b. PPTP

c. PP2T

d. SLIP
Definition
Term
A VPN is designed to connect 15 film animators and programmers from around the state of California. At the core of the VPN is a router connected to a high-performance server used for storing the animation files. The server and router are housed in an ISP's data center. The ISP provides two different T3 connections to the Internet backbone. What type of connection must each of the animators and programmers have to access the VPN?

a. At least a fractional T1 connection to the Internet

b. At least a T1 connection to the Internet

c. At least a T3 connection to the Internet

d. Any type of Internet connection
Definition
Term
Which of the following functions makes VPN protocols unique?

a. The ability to precisely time packet delivery

b. The ability to interpret both frames and datagrams

c. The ability to create tunnels

d. The ability to detect eavesdropping
Definition
Term
As a business owner, you have decided to outsource all of your company's IT services to a cloud computing service provider. How can your clients and employees access these services?

a. From a smartphone using cellular signals

b. From a desktop workstation attached to a DSL Internet connection

c. From a server at an office overseas, using a T1

d. All of the above
Definition
Supporting users have an ad free experience!