
CIST 1601: Chapter 9 Quiz
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is used as a secure tunnel to connect two networks?
VLAN
VAN
VFA
VPN
Answer explanation
A VPN is used as a secure tunnel to connect two networks. It creates a private and encrypted connection over the internet, ensuring that the data transmitted between the connected networks is secure and protected from unauthorized access.
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is an advantage of software-defined networking (SDN)?
Is currently a new technology
Standards are still being developed
More granular control
Lack of vendor support
Answer explanation
SDN allows for centralized control of network infrastructure using software applications. This centralized control enables administrators to have more precise and granular control over network traffic, configuration, and management, leading to increased flexibility, efficiency, and responsiveness in network operations.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is an advantage of a virtual browser?
Protects the host operating system from malicious downloads
Prevents adware and spyware that monitor your internet activity
Prevents phishing and drive-by downloads
Filters internet content based on ratings
Answer explanation
A virtual browser operates in an isolated environment, preventing potentially harmful downloads from affecting the host operating system. This isolation helps protect the underlying system from malware and other security threats that may be encountered while browsing the internet.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which load balancing method distributes a workload across multiple computers?
Resource pooling
Virtualization
Bottleneck
Workload balancing
Answer explanation
Workload balancing involves optimizing the distribution of tasks or processes among various computing resources to ensure efficient utilization and prevent overload on any single component.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is a virtual LAN that runs on top of a physical LAN called?
VLAN
VAN
VFA
VMM
Answer explanation
VAN is a less common term but could be used to describe a network concept similar to VLAN, emphasizing the virtual aspect. VAN stands for Virtual Area Network.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the limit of virtual machines that can be connected to a virtual network?
1,000
10,000
100,000
Unlimited
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following devices facilitates communication between different virtual machines by checking data packets before moving them to a destination?
Virtual Switch
Virtual Router
VLAN
VFA
Answer explanation
The device that facilitates communication between different virtual machines by checking data packets before moving them to a destination is commonly known as a Virtual Switch. A Virtual Switch operates at the data link layer (Layer 2) of the OSI model and is responsible for forwarding network traffic between virtual machines within the same virtualized environment. It checks data packets, manages network traffic, and ensures that communication between virtual machines is efficient and secure. Virtual switches are a key component in virtualized environments, such as those created using hypervisors like VMware, Hyper-V, or VirtualBox.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?