NDG Network Virtualization concepts Course Questions اسئلة

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Network Virtualization Concepts:

Type: Multiple Choice, Single Answer


1 What is the naming of virtual network created on the top of physical network?[Choose 1]
Underlay networking
VLAN networking
VXLAN networking
Overlay networking

Type: Multiple Choice, Multiple Answers


2 GENEVE was jointly developed by: [Choos3]
VMware
Cisco
Microsoft
Red Hat

Type: Multiple Choice, Single Answer


3 Which Protocol is used to assign IP addresses to VMs in dynamic way? [Choose 1]
RIP
DHCP
VXLAN
GENEVE

Type: True or False


4 True or False. GENEVE is more flexible than VXLAN protocol.
True
False

Type: Multiple Choice, Single Answer


5 if you need to set up an isolated virtual network, which networking kind will be efficient for
VMs?[Choose 1]
Bridged Networking
Host-Only Networking
NAT networking
None of the above

Type: Multiple Choice, Single Answer


6 By default, each ESXi host has a single virtual switch called: [Choos1]
Open Virtual Switch (OVS)
VMware Switch

1
vSwitch0
vSwitch1

Type: Multiple Choice, Multiple Answers


7 Which are the most two widely used methodologies of VMware overlay networking?
[Choose 2]
GRE
VXLAN
L2TP
GENEVE

Type: True or False


8 True or False. A network type where both a virtual machine and the host that it is running
on are connected to the same network is called Host-Only Networking.
True
False

Type: Multiple Choice, Single Answer


9 Each vSphere Distributed Switch can manage up to:[Choose 1]
1000 hosts
2000 hosts
3000 hosts
200 hosts

Type: Multiple Choice, Single Answers


10 What are the two types of virtual switches supported by VMware? [Choos2]
OVS Switch
Extended Switch
Standard Switch
Distributed Switch

Type: Multiple Choice, Multiple Answers


11 Which are the most uses of VMkernel Adapter? [Choose 2]
VMware vMotion
Security
IP Storage
VLANs

Type: True or False


12 True or False. vDS uses the physical NICs of the ESXi host on which the VMs are running
to connect them to the external network.
True
False

Type: Multiple Choice, Single Answer


13 What is maximum number of VLANs that can be created on a layer 2 physical networks?

2
[Choose 1]
2048 VLAN
4096 VLAN
1024 VLAN
512 VLAN

Type: Multiple Choice, Single Answer


14 SDN uses software to control switches and routers by centralizing: [Choose 1]
Network Planes
Data Planes
Control Planes
Forward Planes

Type: Multiple Choice, Multiple Answers


15 Software-Defined Data Center (SDDC) virtualization includes: [Choose 3]
Applications Virtualization
Compute Virtualization
Network Virtualization
Storage Virtualization

Type: True or False


16 True or False. Virtual links are the software equivalent to physical links.
True
False

Type: Multiple Choice, Single Answer


17 Each vCenter Server system can support up to -------------- vDSs? [Choose 1]
32
64
128
256

Type: Multiple Choice, Multiple Answers


18 Which OSI layers have protocol data unit called Data? [Choos3]
Application Layer
Presentation Layer
Session Layer
Transport Layer

Type: Multiple Choice, Single Answer


19 The data plane section of the vDS is called -------------: [Choose 1]
Forward Plane
Port Plane
Host proxy switch
None of the above

Type: True or False

3
20 True or False. In the software-defined data center, the hypervisor is not the controller.
True
False

Type: Multiple Choice, Multiple Answer


21 Which are the tunneling protocols used for NSX Logical Switching?[Choose 2]
GRE
VXLAN
L2TP
GENEVE

Type: Multiple Choice, Single Answer


22 In NSX Logical Routing, The tier-0 logical router is attached to the physical network for
which type of traffic routing?: [Choose 1]
East-South
North-South
East-West
North-West

Type: Multiple Choice, Single Answer


23 In NSX Logical Routing, The tier-1 logical router is used to manage which type of traffic
routing?: [Choose 1]
East-South
North-South
East-West
North-West

Type: True or False


24 True or False. In NSX Logical Routing, Tier-1 logical routers support static & dynamic
routing protocols.
True
False

Type: Multiple Choice, Single Answer


25 The NSX Edge firewall provides stateful perimeter defense for --------------: [Choose 1]
All types of traffic flows
North-south traffic flows
East-west traffic flows
None of the above

Type: Multiple Choice, Single Answers


26 Internet Protocol Security (IPsec) can be used to: [Choose 3]
Authenticate the senders of data
Check the integrity of data

4
Establish layer 2 tunnel for data
Encrypt the data

Type: Multiple Choice, Single Answer


27 The Distributed Firewall (DFW) is enabled in the kernel on the ESXi host and focuses on
controlling ------------------: [Choose 1]
East-south traffic
North -south traffic
North-west traffic
East-west traffic

Type: True or False


28 True or False. With Layer 3 VPN (L3 VPN), you can extend layer 2 networks (VLANs or
VXLANs) across multiple sites that are on the same broadcast domain.
True
False

Type: Multiple Choice, Single Answer


29 The NSX-T Manager is based on ?[Choose 1]
Windows operating system
Photon operating system
Ubuntu operating system
Fedora operating system

Type: Multiple Choice, Multiple Answers


30 NSX architecture consists of 3 planes as: [Choose 3]
Data plane
Control plane
Security plane
Management plane

Type: Multiple Choice, Single Answer


31 Which is the main benefit of Micro-segmentation? [Choose 1]
Switching easily
Routing easily
Security easily
Quality easily

Type: True or False


32 True or False. The main infrastructure elements of SDDC virtualization are routers,
switches, load balancers, and firewalls.
True
False

You might also like