Chapter 9 Exam Questions With Correct
Answers
You have a development machine that contains sensitive information relative to your business.
You are concerned that spyware and malware might be installed while users browse websites,
which could compromise your system or pose a confidentiality risk.
Which of the following actions would BEST protect your system? - answer✔✔Run the browser
within a virtual environment.
Which of the following is an advantage of a virtual browser? - answer✔✔Protects the host
operating system from malicious downloads
Which of the following is an exploit in which malware allows the virtual OS to interact directly
with the hypervisor? - answer✔✔Escape
Which of the following devices is computer software, firmware, or hardware that creates and
runs virtual machines? - answer✔✔Hypervisor
Which of the following is a technique that disperses a workload between two or more computers
or resources to achieve optimal resource utilization, throughput, or response time? -
answer✔✔Load balancing
What is isolating a virtual machine from the physical network to allow testing to be performed
without impacting the production environment called? - answer✔✔Sandboxing
Which of the following are disadvantages of server virtualization? - answer✔✔A compromised
host system might affect multiple servers
Which type of hypervisor runs as an application on the host machine - answer✔✔Type 2
Which of the following are advantages of virtualization? (Select two.) - answer✔✔Centralize
administration
Easy migration of systems to different hardware
Which load balancing method distributes a workload across multiple computers? -
answer✔✔Workload balancing
, EXAM STUDY MATERIALS 8/7/2024 11:29 AM
Which of the following provides the network virtualization solution called XenServer? -
answer✔✔Citrix
Which of the following is a network virtualization solution provided by Microsoft? -
answer✔✔Hyper-V
What is the limit of virtual machines that can be connected to a virtual network? -
answer✔✔Unlimited
You are an application developer. You use a hypervisor with multiple virtual machines installed
to test your applications on various operating systems' versions and editions.
Currently, all of your virtual machines used for testing are connected to the production network
through the hypervisor's network interface. However, you are concerned that the latest
application you are working on could adversely impact other network hosts if errors exist in the
code.
To prevent issues, you decide to isolate the virtual machines from the production network.
However, they still need to be able to communicate directly with each other.
What should you do? (Select two. Both responses are part of the complete solution.) -
answer✔✔Connect the virtual network interfaces in the virtual machines to the virtual switch.
Create a new virtual switch configured for host-only (internal) networking.
Which of the following statements about virtual networks is true? (Select two.) - answer✔✔A
virtual network is dependent on the configuration and physical hardware of the host operating
system.
Multiple virtual networks can be associated with a single physical network adapter.
Which of the following devices facilitates communication between different virtual machines by
checking data packets before moving them to a destination? - answer✔✔Virtual switch
What is a virtual LAN that runs on top of a physical LAN called? - answer✔✔VAN
Which of the following virtual devices provides packet filtering and monitoring? -
answer✔✔VFA
Which of the following is an example of protocol-based network virtualization? -
answer✔✔VLAN
Which of the following is used as a secure tunnel to connect two networks? - answer✔✔VPN
Which of the following is an advantage of software-defined networking (SDN)? -
answer✔✔More granular control