Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CIT132 Chaper 10 Virtual and Remote Networks

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
authentication   The process of comparing and matching a client’s credentials with the credentials in the NOS user database to enable the client to log on to the network.  
🗑
client-to-site VPN   A type of VPN in which clients, servers, and other hosts establish tunnels with a private network using a remote access server or VPN gateway.  
🗑
cloud computing   The flexible provision of data storage, applications, or services to multiple clients over a network. Cloud computing consolidates resources and is elastic, metered, self-service, multiplatform, and available on demand.  
🗑
credentials   A user’s unique identifying characteristics that enable him to authenticate with a server and gain access to network resources. The most common credentials are a username and a password.  
🗑
dial-up networking   The process of dialing into a remote access server to connect with a network, be it private or public.  
🗑
elastic   A characteristic of cloud computing that means services can be quickly and dynamically—sometimes even automatically—scaled up or down.  
🗑
guest   In the context of virtualization, a virtual machine operated and managed by a virtualization program.  
🗑
host   In the context of virtualization, the physical computer on which virtualization software operates and manages guests.  
🗑
Hyper-V   Microsoft’s virtualization software package. Hyper-V operates with Windows Server 2008 and Windows Server 2008 R2.  
🗑
hypervisor   The element of virtualization software that manages multiple guest machines and their connections to the host (and by association, to a physical network). A hypervisor is also known as a virtual machine manager.  
🗑
ICA (Independent Computing Architecture)   The software from Citrix Systems, Inc., that, when installed on a client, enables the client to connect with a host computer and exchange keystrokes, mouse clicks, and screen updates.  
🗑
KVM (Kernel-based Virtual Machine)   An open source virtualization package designed for use with Linux systems.  
🗑
L2TP (Layer 2 Tunneling Protocol)   A protocol that encapsulates PPP data, for use on VPNs. L2TP is based on Cisco technology and is standardized by the IETF. It is distinguished by its compatibility among different manufacturers’ equipment;  
🗑
multitenant   A feature of cloud computing in which multiple customers share storage locations or services without knowing it.  
🗑
NaaS (Network as a Service)   A type of cloud computing that offers clients a complete set of networking services—for example, mail, Web, DNS, DHCP, and remote access services, plus LAN and WAN connectivity.  
🗑
open source   The term that describes software whose code is publicly available for use and modification.  
🗑
PPP (Point-to-Point Protocol)   A communications protocol that enables a workstation to connect to a server using a serial connection. PPP can support multiple Network layer protocols. It performs compression and error correction  
🗑
PPPoE (Point-to-Point Protocol over Ethernet)   PPP running over an Ethernet network.  
🗑
PPTP (Point-to-Point Tunneling Protocol)   A Layer 2 protocol developed by Microsoft that encapsulates PPP data for transmission over VPN connections. PPTP operates with Windows RRAS access services and can accept connections from multiple different clients.  
🗑
private cloud   An arrangement in which shared and flexible data storage, applications, or services are managed on and delivered via an organization’s internal network.  
🗑
public cloud   An arrangement in which shared and flexible data storage, applications, or services are managed centrally by service providers and delivered over public transmission lines, such as the Internet. Rackspace and Amazon examples.  
🗑
RAS (Remote Access Service)   The dial-up networking software provided with Microsoft Windows 95, 98, NT, and 2000 client operating systems. RAS requires software installed on both the client and server,  
🗑
RDP (Remote Desktop Protocol)   An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. RDP also carries session, licensing, and encryption information.  
🗑
remote access   A method for connecting and logging on to a LAN from a workstation that is remote, or not physically connected, to the LAN.  
🗑
Remote Desktop   A feature of Windows operating systems that allows a computer to act as a remote host and be controlled from a client running another Windows operating system.  
🗑
Routing and Remote Access Service (RRAS)   The software included with Windows operating systems that enables a server to act as a router, firewall, and remote access server. Using RRAS, a server can provide network access to multiple remote clients.  
🗑
site-to-site VPN   A type of VPN in which VPN gateways at multiple sites encrypt and encapsulate data to exchange over a tunnel with other VPN gateways. Meanwhile, clients, servers, and other hosts on a site-to-site VPN communicate with the VPN gateway.  
🗑
SLIP (Serial Line Internet Protocol)   A communications protocol that enables a workstation to connect to a server using a serial connection. SLIP can support only asynchronous communications and IP traffic . SLIP has been made obsolete by PPP.  
🗑
thin client   A client that relies on another host for the majority of processing and hard disk resources necessary to run applications and share files over the network.  
🗑
tunnel   A secured, virtual connection between two nodes on a VPN.  
🗑
tunneling   The process of encapsulating one type of protocol in another. Tunneling is the way in which higher-layer data is transported over VPNs by Layer 2 protocols.  
🗑
virtual appliance   An image that includes the appropriate operating system, software, hardware specifications, and application configuration necessary for a prepackaged solution to run properly on a virtual machine.  
🗑
virtual bridge   An interface connecting a vNIC with a virtual or physical network, or a port on a virtual switch.  
🗑
virtual desktop   A desktop operating environment that is hosted virtually, on a different physical computer from the one the user interacts with.  
🗑
virtual server   A server that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.  
🗑
virtual switch   A logically defined device that is created and managed by virtualization software and that operates at the Data Link layer. Ports on a virtual switch connect virtual machines with a network, whether virtual or physical, through the host’s physical NIC.  
🗑
virtual workstation   A workstation that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.  
🗑
VirtualBox   A virtualization software platform from Oracle.  
🗑
virtualization   The emulation of a computer, operating system environment, or application on a physical system.  
🗑
VM (virtual machine)   A computer that exists in emulation on a physical computer, or host machine. Multiple VMs may exist on one host where they share the physical computer’s CPU, hard disk, memory, and network interfaces.  
🗑
VMware   A vendor that supplies the most popular types of workstation and server virtualization software. Used casually, the term VMware may also refer to the virtualization software distributed by the company.  
🗑
VNC (Virtual Network Computing)   An open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. Examples of VNC software include RealVNC, TightVNC, and UltraVNC.  
🗑
vNIC (virtual network interface card)   A logically defined network interface associated with a virtual machine.  
🗑
VPN (virtual private network)   A logically constructed WAN that uses existing public transmission systems. VPNs can be created through the use of software or combined software and hardware solutions.  
🗑
XaaS (Anything as a Service, or Everything as a Service)   A type of cloud computing in which the cloud assumes functions beyond networking, including, for example, monitoring, storage, applications, and virtual desktops.  
🗑
Xen   An open source virtualization software platform from Citrix Systems.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: Leisac
Popular Computers sets