Professional Documents
Culture Documents
Full download Hands on Virtual Computing 2nd Edition Simpson Test Bank all chapter 2024 pdf
Full download Hands on Virtual Computing 2nd Edition Simpson Test Bank all chapter 2024 pdf
Full download Hands on Virtual Computing 2nd Edition Simpson Test Bank all chapter 2024 pdf
https://testbankfan.com/product/hands-on-virtual-computing-2nd-
edition-simpson-solutions-manual/
https://testbankfan.com/product/hands-on-ethical-hacking-and-
network-defense-2nd-edition-simpson-test-bank/
https://testbankfan.com/product/hands-on-ethical-hacking-and-
network-defense-1st-edition-simpson-test-bank/
https://testbankfan.com/product/hands-on-ethical-hacking-and-
network-defense-1st-edition-simpson-solutions-manual/
Hands-On Database 2nd Edition Steve Conger Test Bank
https://testbankfan.com/product/hands-on-database-2nd-edition-
steve-conger-test-bank/
https://testbankfan.com/product/hands-on-networking-
fundamentals-2nd-edition-michael-palmer-test-bank/
https://testbankfan.com/product/hands-on-database-2nd-edition-
steve-conger-solutions-manual/
https://testbankfan.com/product/hands-on-networking-
fundamentals-2nd-edition-michael-palmer-solutions-manual/
https://testbankfan.com/product/applied-information-security-a-
hands-on-guide-to-information-security-software-2nd-edition-
boyle-solutions-manual/
Name: Class: Date:
1. The e1000 network adapter type is the default adapter used by vSphere for virtual machines that run 64-but
guest operating systems.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/27/2017 10:14 AM
3. VMware vSphere 6 provides support for USB 3.0 devices in virtual machines.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
4. NIC teaming policies are set for an entire standard switch, and cannot be changed at the port group level.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: Virtual Network Switch Policies
Copyright Cengage Learning. Powered by Cognero. Page 1
Name: Class: Date:
5. Each VMkernel port must be configured with its own IP address and gateway.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: Configuring Virtual Switches
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
Multiple Choice
6. What are the two major console interfaces used to work with an ESXi host?
a. Direct Console User Interface (DCUI) and vCLI
b. vSphere Remote Console and vTerminal
c. vSphere ESXi Control Center and vSphere Shell Interface
d. Remote Access Client (RAC) and vConsole
ANSWER: a
POINTS: 1
REFERENCES: Working with the ESXi Consoles
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
7. You are attempting to utilize a packet capturing software in your studies of a network's traffic, however, your
virtual machine running on vSphere is unable to put the network adapter in promiscuous mode. What is the
most likely reason for the failure?
a. A network security policy is preventing the use of a promiscuous mode interface.
b. vSphere does not support the use of promiscuous mode devices.
c. vSphere is connected to the network via a switch, and therefore cannot change to promiscuous mode.
d. The virtual machine hardware compatibility mode is limiting the virtual machine to legacy adapters.
ANSWER: a
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
Copyright Cengage Learning. Powered by Cognero. Page 2
Name: Class: Date:
8. What virtual machine configuration file holds the virtual machine's snapshot state information?
a. VM_name.vmsd
b. VM_name.vmss
c. VM_name.vswp
d. VM_name.vmdk
ANSWER: b
POINTS: 1
REFERENCES: Working with Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
9. What command can you use to add a comma separated list of users to an ESXi server using VCLI?
a. vicfg-user --adduser -l
b. viuser-cfg --add --type=user
c. vicfg-adduser
d. vicfg-user -u
ANSWER: d
POINTS: 1
REFERENCES: Working with the ESXi Consoles
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
10. A virtual machine providing services for your network was recently hacked and used to spoof MAC
addresses on your network to target other systems. What policies could you set to prevent this from
reoccurring?
a. The MAC address changes and forged transmits policies should be set to "Reject".
b. The promiscuous mode and MAC address changes policies should be set to "Reject".
c. The promiscuous mode and the forged transmits policies should be set to "Reject"
d. Only the promiscuous mode needs to be set to reject.
ANSWER: a
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 3
Name: Class: Date:
11. You are trying to support a VOIP application on a virtual machine, and need to prioritize VOIP traffic. What
kind of virtual switch policy should you use?
a. NIC teaming policy
b. traffic shaping policy
c. security policy
d. application priority policy
ANSWER: b
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
12. What traffic shaping policy option determines the max number of kilobits per second to allow across a port
when it is sending a burst of traffic?
a. burst size
b. average bandwidth
c. peak bandwidth
d. surge bandwidth
ANSWER: c
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
13. What traffic shaping policy option determines the number of kilobits per second to allow across a port,
averaged over time?
a. average bandwidth
b. average peak bandwidth
c. burst size
d. average throughput
ANSWER: a
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 4
Name: Class: Date:
14. When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file?
a. It is replaced by a .vmtx template configuration file.
b. It is supplemented by a .vmtx file, as both files are required to define the VM.
c. Nothing; vSphere templates are created using information in a sub directory of the VM.
d. It is modified to include the settings required for creating the template.
ANSWER: a
POINTS: 1
REFERENCES: Working with Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
15. What is NOT one of the valid choices available for ESXi's virtual SCSI adapter?
a. BusLogic Parallel
b. LSI Logic Parallel
c. LSI Logic SAS
d. BusLogic SAS
ANSWER: d
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
16. What are the two GUI clients provided by VMware for use with vSphere?
a. Direct Console User Interface (DCUI) and vSphere User Frontend
b. visual CLI and vSphere Client
c. vSphere Controller and vSphere Web Client
d. vSphere Web client and vSphere Client
ANSWER: d
POINTS: 1
REFERENCES: Working with the ESXi Consoles
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
18. You are using a gigabit Ethernet adapter (vmnic1) on an ESXi host, and you have found that the status
screen displays the adapter as being connected at 100 Mb, full duplex. You have verified that the switch your
server connects to has 1 Gbps capable ports. What is most likely the problem?
a. The adapter has been manually configured to a speed of 100 Mb, duplex operation.
b. The adapter's driver in ESXi does not have 1 Gbps capability.
c. The cable connecting the server and switch is damaged.
d. The virtual machine using vmnic1 has limited the speed of the interface.
ANSWER: a
POINTS: 1
REFERENCES: Configuring Virtual Switches
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
19. What sort of application might require the promiscuous mode security policy to be configured to "accept" in
order to support?
a. A web server with multiple virtual host configurations.
b. An e-mail server that utilizes load balancing features.
c. A clustered application that shares its IP address with other instances.
d. A network monitoring application such as an intrusion detection system (IDS).
ANSWER: d
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
Copyright Cengage Learning. Powered by Cognero. Page 6
Name: Class: Date:
20. You are configuring a Linux based 64-bit virtual machine for use on a vSphere host. Based on this
information, what will be the default network adapter type and why?
a. The default will be vmxnet to provide basic support for networking.
b. The vlance adapter will be used, because it is the most compatible.
c. The e1000 adapter type will be used, because it is the default for 64-bit guest operating systems.
d. The vmxnet3 adapter type will be used, because Linux has a built in driver.
ANSWER: c
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
21. While using vSphere for free, you are limited to how many virtual CPUs?
a. 1
b. 8
c. 32
d. 128
ANSWER: b
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
22. What virtual disk file type takes the longest to create?
a. thick provision lazy zeroed
b. thick provision eager zeroed
c. thin provision lazy zeroed
d. independent provision
ANSWER: b
POINTS: 1
REFERENCES: Creating Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
23. What type of virtual switch exists only within a single vSphere hypervisor?
Copyright Cengage Learning. Powered by Cognero. Page 7
Name: Class: Date:
25. A security policy has been applied to an individual port on a virtual switch. The switch itself has a
conflicting policy configured. What setting has priority?
a. The settings at the virtual switch level will have priority, as the policy is inherited by the port.
b. The settings on the port will have priority, because the policy is overridden at the port level.
c. The overall setting will be disabled until the conflicting settings are manually changed.
d. The more restrictive setting will be used automatically.
ANSWER: b
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
26. What virtual network adapter type should you use if you need to support fault tolerance as well as
record/replay for network traffic?
Copyright Cengage Learning. Powered by Cognero. Page 8
Name: Class: Date:
27. Under what conditions might a virtual machine have a lock file?
a. A lock file can exist when a raw device mapping is utilized.
b. Lock files are used when a thin provisioned disk is configured.
c. Lock files are used when an IDE controller is configured for a virtual machine.
d. A lock file can exist when a virtual machine is stored on an NFS based data store.
ANSWER: d
POINTS: 1
REFERENCES: Working with Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
28. What configuration file name would be assigned to the Raw Device Map (RDM) pointer file for a VM
named Srv1?
a. Srv1.vmdk.rdm
b. Srv1.vswp
c. Srv1.rdm.vmdk
d. Srv1.rdm.vswp
ANSWER: c
POINTS: 1
REFERENCES: Working with Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
29. How many archive logs are maintained for a virtual machine at any one time?
a. two
30. What is the maximum number of vCPUs supported by the fully licensed version of the vSphere hypervisor?
a. 8 vCPUs
b. 16 vCPUs
c. 64 vCPUs
d. 128 vCPUs
ANSWER: d
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
Matching
31. A console interface that can be used to interact with an ESXi server host.
ANSWER: a
POINTS: 1
32. The process of assigning more disk space to virtual disks that you have space available on a VMFS data
store.
ANSWER: b
POINTS: 1
33. A file stored in a VMFS volume that acts as a proxy or go-between providing a physical storage device to
virtual disk mapping.
ANSWER: c
POINTS: 1
34. Allows the administrator to set up rules and procedures to manage how virtual network resources are used.
ANSWER: d
POINTS: 1
35. Allocates the space required for a virtual machine during creation. Data remaining on the physical device is
zeroed out when the disk is created.
ANSWER: e
POINTS: 1
36. Space required for a virtual disk is allocated during creation, but data remaining on the physical device is
not erased during creation, it is zeroed out over time.
ANSWER: f
POINTS: 1
37. Uses only as much data store space as the disk initially needs.
ANSWER: g
POINTS: 1
38. As an example, this is used by a physical switch to pass packets from multiple VLANs to a host using
VLAN tags.
ANSWER: h
POINTS: 1
40. The next generation of a paravirtualized NIC, designed for performance and advanced features such as fault
tolerance.
Copyright Cengage Learning. Powered by Cognero. Page 11
Name: Class: Date:
42. When defining the network security policy, what security exceptions are you allowed to set, and what do
they do?
ANSWER: The network security policy allows the administrator to set the following security exceptions:
* Promiscuous Mode—When set to Reject, placing a guest adapter in promiscuous mode has no
effect on which frames are received by the adapter (default is Reject).
* MAC Address Changes—When set to Reject, if the guest attempts to change the MAC address
assigned to the virtual NIC, it stops receiving frames (default is Accept).
* Forged Transmits—When set to Reject, the virtual NIC drops frames that the guest sends, where
the source address field contains a MAC address other than the assigned virtual NIC MAC address
(default is Accept).
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
43. What are the three options available when configuring a traffic shaping policy?
ANSWER: The three options for configuring a traffic shaping policy are as follows:
* Average bandwidth--Establishes the number of kilobits per second to allow across a port, averaged
over time. The average bandwidth is the allowed average load.
* Peak bandwidth--The maximum number of kilobits per second to allow across a port when it is
sending a burst of traffic. This number tops the bandwidth that is used by a port whenever the port is
using its burst bonus.
* Burst size--Size—The maximum number of kilobytes to allow in a burst. If this parameter is set, a
port might gain a burst bonus if it does not use all its allocated bandwidth.
POINTS: 1
44. What are the three different types of ports that exist on a virtual switch?
ANSWER: The three types of ports on a virtual switch are: virtual machine ports, VMkernel ports, and uplink
ports. Virtual machine ports are used to handle traffic between virtual machines and between virtual
machines and the physical network. VMkernel ports include the management network port used to
connect to remote consoles such as the vSphere Client, as well as ports for network storage, vMotion
migration, and fault tolerance. Uplink ports are used to connect one or more physical network
adapters to the virtual switch.
POINTS: 1
REFERENCES: Configuring Virtual Switches
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
46. What level of support does vSphere 6 provide for USB devices, and how can they be used with vSphere?
ANSWER: vSphere 6 supports USB 3.0 devices in virtual machines, allowing devices such as smart-card readers
and flash drives to be attached. Since USB devices cannot be connected directly to the ESXi host
computer, connecting a USB drive to your virtual machine requires connecting the USB device to a
desktop computer running the VMware vSphere® Web Client application or the vSphere Client. The
virtual machine can then access the USB device from the client computer.
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
Copyright Cengage Learning. Powered by Cognero. Page 13
Name: Class: Date:
47. What is the vmxnet3 virtual network adapter, and what features does it provide?
ANSWER: The vmxnet3 adapter is the next generation of a paravirtualized NIC designed for performance. It is
not related to vmxnet or vmxnet2. The vmxnet3 adapter offers all the features available in vmxnet2
and adds several features, like multiqueue support (called Receive-Side Scaling in Windows), IPv6
offloads, and MSI/MSI-X interrupt delivery. vmxnet3 devices support fault tolerance and
record/replay.
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
48. What are some of the benefits of thin provisioning virtual disk files?
ANSWER: Thin provisioning enables virtual machines to use storage space as needed, further reducing the cost
of storage for virtual environments considerably. Thin provisioning is often used with storage array
deduplication to improve storage use and to backup virtual machines. Thin provisioning can be
configured to provide alarms and reports to track current usage of storage capacity as well as
allowing a storage administrator to optimize the allocation of storage for virtual environments.
POINTS: 1
REFERENCES: Creating Virtual Machines
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
49. What is a raw device mapping (RDM), and when is it recommended that it be used?
ANSWER: Instead of storing virtual machine data in a virtual disk file stored on a VMFS data store, when using
an RDM disk the guest operating system stores data directly on a the host computer’s storage (local
or SAN). Storing the data this way may provide faster data access and is useful if you are running
applications in your virtual machines that must know the physical characteristics of the storage
device. An RDM is recommended when a virtual machine must interact with data on the actual local
disk on the SAN.
POINTS: 1
REFERENCES: Creating Virtual Machines
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
50. What are the three major virtual disk file types, and how do they differ?
ANSWER: The three major virtual disk file types are as follows:
* Thick Provision Lazy Zeroed--Space required for the virtual disk is allocated during creation. Data
remaining on the physical device is not erased during creation, but is zeroed out on demand at a later
time on first write from the virtual machine.
Copyright Cengage Learning. Powered by Cognero. Page 14
Name: Class: Date:
4. Ephydatia Mülleri (L i e b e r k ü h n ).
Fig. 41.
Ephydatia Mülleri (Lieberkühn). ½
natürl. Grösse, nach einem
getrockneten Exemplar. (Tharandt,
Schlossteich.)
Fig 43
Fig. 43.
Ephydatia fluviatilis (Autt.) nach
einem in Alkohol konserv. Stück.
½ natürl. Grösse. (Spree, Berlin:
Waisenbrücke, 26. Aug. 1886.)
Die Farbe ist smaragdgrün, hellgrün, hellisabellgelb, schmutzig-
weiss oder weiss. Die glatten, schlanken, allmählich oder plötzlich
scharf zugespitzten, leicht gekrümmten Skelettnadeln sind wie bei
Sp. fragilis nur durch wenig Spongiolinsubstanz mit einander
verbunden; der Schwamm ist daher leicht zerreissbar und brüchig.
Öfters finden sich unter den Nadeln auch kurze, dicke oder
auffallend lange und dicke Formen. Die Gemmulae sind gelblich und
haben eine dicke Hülle, die Luftkammerschicht hat eine äussere
Kutikula. Die Amphidisken sind daher ganz in der Luftkammerschicht
eingeschlossen und bilden eine einfache Lage in derselben. Der
Schaft ist dünn, glatt oder bedornt und oft in der Mitte etwas
eingezogen. Er ist doppelt so lang, als der Durchmesser der
Scheiben beträgt. Diese sind am Rande durch ihre zahlreichen, nicht
tiefen Einschnitte ausgezeichnet. Doch finden sich häufig
Exemplare, bei denen die mit langem Schafte ausgestatteten
Scheiben nur wenige tiefe Einschnitte zeigen.
Sehr gemein in stehenden und fliessenden Gewässern in
Deutschland. Auch im Brackwasser, so in der Untertrave bei
Travemünde, deren Wasser 0.34% Salzgehalt zeigt (L e n z ). Auch in
der Dievenow bei Cammin in Pommern, welche bis zu der
genannten Stadt von dem eindringenden Seewasser durchschnittlich
2–3mal im Monat während eines Jahres schwach versalzt werden
soll (W e l t n e r ).
Fig. 44.
Ephydatia fluviatilis.
Alkoholexemplar, ½ natürl. Grösse.
(29. Nov. 1886, Spree, Berlin, 4
Fuss tief.)
6. Ephydatia bohemica (P e t r ).
Fig. 45.
Cart. Stepanowi (Dyb.).
½ natürl. Grösse n. d.
Leben. (Nach Petr.)
Anhang.
Wir müssen hier noch einer von J o s e p h erwähnten Spongilla
stygia gedenken. Diese neue Form wurde in der Grotte Gurk in
Unterkrain von J o s e p h gefunden und ist völlig durchsichtig. Die
Nadeln sind glatt und an einem Ende keulenförmig verdickt. Nach
M a r s h a l l [85] sollen die Gemmulae wirklich fehlen. Es wäre
wünschenswert, diese neue Art genauer zu studieren.
4
Porus der Gemmula in ein langes Rohr ausgezogen
Carterius Stepanowi.
3 Porus der Gemmula in einen breiten Trichter ausgehend oder
(selten) in eine kurze Röhre verlängert
Ephydatia bohemica.
Amphidisken mit langem Schaft, Endscheiben meist mit
zahlreichen aber nicht sehr tiefen Einschnitten.
Luftkammerschicht mit dünner Kutikula umschlossen.
Skelettnadeln glatt. Spongiolinsubstanz schwach entwickelt
Ephydatia fluviatilis.
4
Amphidisken mit kurzem Schaft, Endscheiben oft nur mit
wenigen aber tiefen Einschnitten. Luftkammerschicht ohne
äussere Kutikula. Skelettnadeln glatt oder rauh oder beide
Sorten vorhanden. Spongiolin ziemlich reichlich
Ephydatia Mülleri.
Gemmulae zu 2–30 in Gruppen in einer dicken, deutlich zelligen
Membran eingeschlossen. Der grösste Teil der Gemmulae
bildet an der Basis des Schwammes eine kontinuierliche
einfache Lage, in einer ebenso gestalteten Membran
5 eingebettet. Fleischnadeln fehlen
Spongilla fragilis.
Gemmulae immer einzeln in den Maschen des
Schwammgerüstes steckend. Fleischnadeln vorhanden
Euspongilla lacustris.
7. Verbreitung.
Wenn diejenigen Spongien, welche man, vielleicht nicht ganz mit
Recht, als eine eigene Familie der Spongillidae anderen Familien
gegenübergestellt hat, auch vorzugsweise Bewohner des süssen
Wassers sind, so haben wir doch schon erfahren, dass auch
einzelne Arten im brackischen Wasser leben können. Wir fügen dem
jetzt hinzu, dass auch in den Gewässern Floridas Spongilliden
gefunden worden sind, welche gelegentlich in versalztem Wasser zu
leben gezwungen sind (P o t t s 1890). Ja, es fehlt auch nicht an
solchen Arten, die sowohl das süsse Wasser als das Meer
bewohnen, da die von P a l l a s im Baikalsee entdeckte Spongia
baicalensis (Pall.) nunmehr auch im Behringsmeer entdeckt worden
ist (Dybowski).
Alle Süsswasserschwämme leben vorzugsweise auf festen,
abgestorbenen oder doch nicht mehr lebenden Gegenständen; eine
Auswahl wird dabei nicht getroffen. Es kommt ihnen nicht darauf an,
einen alten Schuh, einen Nagel, ein Stück Leder, einen Fetzen Tuch,
eine alte Muschel oder Eierschale zur Unterlage zu benutzen.
Seltener wachsen sie auf lebenden Baumwurzeln oder Konchylien.
Schlamm ist ihr ausgesprochener Feind und nur P o t t s erwähnt
einen Fall, in welchem sich eine Spongillide auf Schlammboden
angesiedelt hatte. Auch in der Spree lebt Eusp. lacustris im
Schlamm; an solchen Exemplaren ist aber stets der im Schlamme
steckende Teil abgestorben.
Die Tiefen, in denen diese Schwämme leben, sind sehr
verschieden. Bei uns werden sie dicht unter der Wasseroberfläche
gefunden und sie steigen bis 4 m hinab. F o r e l fand im Lac de Joux
noch in 20 m Tiefe eine Spongillide, vermisste die Schwämme aber
in der Tiefenregion des Genfersees (von 15 m an bis zur grössten
Tiefe des Sees von 334 m). Auch bei uns scheinen die Schwämme
in der Tiefe der Seen zu fehlen; Grundproben, in denen
Schwammnadeln gefunden wurden, beweisen nicht das Vorkommen
von lebenden Schwämmen am Boden, da, wie wir in der Einleitung
erwähnt haben, absterbende Spongillidenstücke häufig auf der
Wasseroberfläche treiben können. Dagegen hat D y b o w s k i den
Baikalseeschwamm in einer Tiefe von 100 m gefunden. Dieser
Schwamm ist hier in 2–6 m Tiefe rasenförmig, in 6–25 m baum- oder
strauchförmig und in 25–100 m wieder rasenförmig. Fügen wir noch
hinzu, dass die im Bodensee in 12–15 Klaftern Tiefe lebende
Spongilla friabilis von W a r t m a n n (E s p e r , „Pflanzenthiere“ II. 1794),
das sogenannte „Fischbrot“, wohl kaum ein Schwamm ist, so hätten
wir über die Tiefenverhältnisse das wichtigste erwähnt.
Wir haben schon Gelegenheit gehabt, den Einfluss des Lichtes
auf die Farbe unserer Schwämme zu betonen. Viele und wohl die
meisten sind am Lichte lebend grün. Andere ebenfalls dem Lichte
ausgesetzte zeigen statt des grünen ein braunes Pigment, welches
ganz anders gestaltet ist als jenes. Sowohl die grünen als die
braunen Formen sind an immer beschatteten Lokalitäten gelblich
oder gänzlich farblos. K r ä p e l i n sammelte gelbliche und farblose
Exemplare in den Röhren der Hamburger und d e V r i e s reinweisse
Stücke in den Kanälen der Rotterdamer Wasserleitung.
Die Höhen, in denen Süsswasserschwämme vorkommen,
erstrecken sich nach den bisherigen Beobachtungen bis auf etwa
1900 m. A l . B r a n d t erwähnt (Zool. Anzeiger 1879 u. 1880) ihr
Vorkommen in zwei armenischen Alpenseen. In zahlreichen Seen
der Schweiz hat man sie gefunden (D u P l e s s i s - G o u r e t , F o r e l ,
I m h o f ). Sie fehlen auch in unseren Gebirgsseen nicht, wie ihr
Vorkommen im Schwarzwald (R e t z e r ) und in den Maaren der Eifel
(Z a c h a r i a s ) beweist, während sie im Kleinen und Grossen Teiche
des Riesengebirges vermisst werden.
D i e A r t d e r Ve r b r e i t u n g .