Term
|
Definition
| Emulation of a computer, operating system environment, or application on a physical system. |
|
|
Term
|
Definition
| Share single CPU, hard drive, memory. or can be can be configured to use different CPU's or NIC's. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Virtual Machine Manager or Hypervisor |
|
Definition
| Software that allows you to define and manage resources allocation and sharing among them. |
|
|
Term
| Advantages of Virtualization |
|
Definition
Efficient of resources Cost and Energy Savings Fault and threat Isolation Simple backups, recovery, and replication |
|
|
Term
| Disadvantages of Virtualization |
|
Definition
Compromised Performance Increased complexity Increased Licensing costs Single Point of Failure |
|
|
Term
| Most potential disadvantage |
|
Definition
| Mitigated through thoughtful network design and virtualization control. |
|
|
Term
|
Definition
| Exist as files on the hard disk of the physical computer, These files contain the operating system, applications, data, and configuration |
|
|
Term
|
Definition
|
|
Term
| Required to connect to a network a virtual machine requires |
|
Definition
|
|
Term
|
Definition
| Logically defined device that operates at the data link layer |
|
|
Term
| Virtual Switches reside in the _____of the physical computers that act as their hosts. |
|
Definition
|
|
Term
| Virtual Switches configuration reside in______ |
|
Definition
| separate file on the hosts hard disk. |
|
|
Term
| What controls the Virtual switches? |
|
Definition
|
|
Term
| Most frequently used network connection types |
|
Definition
|
|
Term
|
Definition
| vNIC accesses a physical network using the host machine's NIC and obtains it own IP address, default gateway, and netmask from a DHCP server on the physical LAN. |
|
|
Term
| In Bridged Mode a VM appears to other nodes as just another____on the network. |
|
Definition
|
|
Term
| Bridged Mode is best used for |
|
Definition
specific address mail servers web servers |
|
|
Term
|
Definition
| VM relies on on the host machine to act as a NAT device. |
|
|
Term
| NAT networking mode is appropriate for clients that_________ to be addressed directly and at a specific address by other sides. |
|
Definition
|
|
Term
| Host-Only networking mode |
|
Definition
| VM's on one host can exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host to create an isolated, all virtual network. |
|
|
Term
| Popular uses for virtual appliances |
|
Definition
Firewall and other security measures network management email solutions remote access |
|
|
Term
|
Definition
| Subnets logically defined on a physical switch that allow network administrators to separate network traffic for better performance, customized address management, and security. |
|
|
Term
| To add VM's to a VLAN defined on a physical network, you modify a ___ |
|
Definition
| virtual switch configuration. |
|
|
Term
| VM's are ______added to preexisting VLAN on the physical switch that manages that VLAN. |
|
Definition
|
|
Term
|
Definition
| You can construct a WAN from existing public transmission systems. This offers connectivity only to an organization's users, while keeping the data secure and isolated from other (public) traffic. To accomplish this. This may be software or hardware based. Depend on secure protocols and transmission methods to keep data private. |
|
|
Term
|
Definition
Flexible provision of data storage applications or services to multiple clients over a network
Consolidates resources Elastic metered, measured Available on demand |
|
|
Term
|
Definition
Services that go beyond networking Monitoring Storage Application Virtual desktops |
|
|
Term
|
Definition
Technology developed by Cisco Used by many different vendors can connect a VPN with a mix of equipment Juniper router or a Cisco router Can connect two routers, a router and a remote access server, or a client and a remote access server. |
|
|
Term
| Two major types of protocols used with VPN's |
|
Definition
|
|
Term
| A VPN tunneling protocol operates______ at the and encapsulates_______ , no matter what network layer protocol is used. |
|
Definition
data link layer network layer packets |
|
|
Term
|
Definition
| Tunnels connect multiple sites on a WAN, Clients and servers do not have to run special VPN software |
|
|
Term
|
Definition
| Clients, servers, and other hosts establish tunnels with a private network using RAS, Must run on special VPN software to create the tunnel for and encrypt and encapsulate data. |
|
|