
Advanced Network Setup Quiz

Quiz
•
Computers
•
University
•
Hard
William Hall
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When configuring Hyper-V on a host machine to run two virtual servers sharing the host's Network Interface Card (NIC), which virtual switch type is most appropriate?
Internal virtual switch
Private virtual switch
External virtual switch
Dedicated virtual switch
Answer explanation
An External virtual switch allows virtual machines to share the host's NIC, enabling them to communicate with external networks. This is essential for running two virtual servers that need network access.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a Hyper-V environment, what is the primary function of the Virtual Switch Extension Filter Driver?
To monitor and filter traffic between virtual machines and the physical network
To enable VLAN tagging on virtual networks
To provide network address translation (NAT) for virtual machines
To facilitate direct memory access (DMA) between virtual machines
Answer explanation
The Virtual Switch Extension Filter Driver primarily monitors and filters traffic between virtual machines and the physical network, ensuring secure and efficient communication.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a potential drawback of using a single external virtual switch in Hyper-V for multiple virtual machines sharing the host's NIC?
Increased CPU utilization due to network traffic
Network bottlenecks due to bandwidth contention
Isolation issues leading to potential security vulnerabilities
Difficulty in managing IP address assignments
Answer explanation
Using a single external virtual switch can lead to network bottlenecks due to bandwidth contention, as multiple VMs compete for the same NIC resources, potentially degrading performance.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In Hyper-V, what is the effect of enabling 'MAC address spoofing' on a virtual network adapter?
It allows the virtual machine to change its MAC address, enabling features like network load balancing.
It prevents the virtual machine from receiving packets not addressed to its original MAC address.
It restricts the virtual machine to a single MAC address, enhancing security.
It enables the virtual machine to impersonate other devices on the network.
Answer explanation
Enabling 'MAC address spoofing' allows a virtual machine to change its MAC address, which is essential for features like network load balancing, as it can respond to traffic directed to different MAC addresses.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When setting up two virtual servers on a Hyper-V host with a single NIC, which network configuration ensures both isolation between the servers and external network access?
Assigning each virtual server to a private virtual switch
Using an internal virtual switch with NAT configured on the host
Connecting both virtual servers to an external virtual switch with VLAN tagging
Implementing a private virtual switch combined with host-based routing
Answer explanation
Connecting both virtual servers to an external virtual switch with VLAN tagging allows for network isolation and external access, as VLANs can separate traffic while still enabling communication with the outside network.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a primary security benefit of placing a reverse proxy server in a DMZ?
It encrypts internal network traffic to prevent eavesdropping.
It hides the internal server's IP address from external clients, reducing direct attack vectors.
It accelerates content delivery by caching static resources.
It authenticates users before granting access to internal resources.
Answer explanation
A primary security benefit of a reverse proxy in a DMZ is that it hides the internal server's IP address from external clients, which reduces direct attack vectors and enhances overall network security.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes the role of a reverse proxy server in a DMZ concerning SSL/TLS termination?
It decrypts incoming SSL/TLS traffic, inspects it, and forwards unencrypted traffic to internal servers.
It establishes encrypted connections with clients and forwards encrypted traffic to internal servers.
It bypasses SSL/TLS encryption to improve performance.
It requires clients to use unencrypted connections to access internal resources.
Answer explanation
A reverse proxy server in a DMZ decrypts incoming SSL/TLS traffic, allowing it to inspect the data for security purposes before forwarding unencrypted traffic to internal servers, enhancing security and performance.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
IT01- MIDTERM

Quiz
•
University
15 questions
barral pukingkay

Quiz
•
University
14 questions
AZ-900 Modulo 2

Quiz
•
KG - Professional Dev...
17 questions
Topic 8 Quiz: Internet and World Wide Web

Quiz
•
University
10 questions
Network devices

Quiz
•
University
19 questions
Windows Active Directory

Quiz
•
University - Professi...
20 questions
MTA: 98-367 Security Part 1

Quiz
•
KG - Professional Dev...
10 questions
Chapter 27

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University