Search Header Logo

Advanced Network Setup Quiz

Authored by William Hall

Computers

University

Used 1+ times

Advanced Network Setup Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When configuring Hyper-V on a host machine to run two virtual servers sharing the host's Network Interface Card (NIC), which virtual switch type is most appropriate?

Internal virtual switch

Private virtual switch

External virtual switch

Dedicated virtual switch

Answer explanation

An External virtual switch allows virtual machines to share the host's NIC, enabling them to communicate with external networks. This is essential for running two virtual servers that need network access.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a Hyper-V environment, what is the primary function of the Virtual Switch Extension Filter Driver?

To monitor and filter traffic between virtual machines and the physical network

To enable VLAN tagging on virtual networks

To provide network address translation (NAT) for virtual machines

To facilitate direct memory access (DMA) between virtual machines

Answer explanation

The Virtual Switch Extension Filter Driver primarily monitors and filters traffic between virtual machines and the physical network, ensuring secure and efficient communication.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a potential drawback of using a single external virtual switch in Hyper-V for multiple virtual machines sharing the host's NIC?

Increased CPU utilization due to network traffic

Network bottlenecks due to bandwidth contention

Isolation issues leading to potential security vulnerabilities

Difficulty in managing IP address assignments

Answer explanation

Using a single external virtual switch can lead to network bottlenecks due to bandwidth contention, as multiple VMs compete for the same NIC resources, potentially degrading performance.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Hyper-V, what is the effect of enabling 'MAC address spoofing' on a virtual network adapter?

It allows the virtual machine to change its MAC address, enabling features like network load balancing.

It prevents the virtual machine from receiving packets not addressed to its original MAC address.

It restricts the virtual machine to a single MAC address, enhancing security.

It enables the virtual machine to impersonate other devices on the network.

Answer explanation

Enabling 'MAC address spoofing' allows a virtual machine to change its MAC address, which is essential for features like network load balancing, as it can respond to traffic directed to different MAC addresses.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When setting up two virtual servers on a Hyper-V host with a single NIC, which network configuration ensures both isolation between the servers and external network access?

Assigning each virtual server to a private virtual switch

Using an internal virtual switch with NAT configured on the host

Connecting both virtual servers to an external virtual switch with VLAN tagging

Implementing a private virtual switch combined with host-based routing

Answer explanation

Connecting both virtual servers to an external virtual switch with VLAN tagging allows for network isolation and external access, as VLANs can separate traffic while still enabling communication with the outside network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary security benefit of placing a reverse proxy server in a DMZ?

It encrypts internal network traffic to prevent eavesdropping.

It hides the internal server's IP address from external clients, reducing direct attack vectors.

It accelerates content delivery by caching static resources.

It authenticates users before granting access to internal resources.

Answer explanation

A primary security benefit of a reverse proxy in a DMZ is that it hides the internal server's IP address from external clients, which reduces direct attack vectors and enhances overall network security.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes the role of a reverse proxy server in a DMZ concerning SSL/TLS termination?

It decrypts incoming SSL/TLS traffic, inspects it, and forwards unencrypted traffic to internal servers.

It establishes encrypted connections with clients and forwards encrypted traffic to internal servers.

It bypasses SSL/TLS encryption to improve performance.

It requires clients to use unencrypted connections to access internal resources.

Answer explanation

A reverse proxy server in a DMZ decrypts incoming SSL/TLS traffic, allowing it to inspect the data for security purposes before forwarding unencrypted traffic to internal servers, enhancing security and performance.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?