Solved

Match Each Item with a Statement Below

Question 21

Matching

Match each item with a statement below.

Premises:
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
A method of gaining access to the underlying host through flaws in the hypervisor.
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Used to determine the MAC address associated with an IP address within the sender's network.
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
A common open source protocol used to communicate between switches and a management server.
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Responses:
distributed switch
software-defined network (SDN)
Address Resolution Protocol (ARP)
directory traversal attacks
VLAN
scanning phase
OpenFlow
internal virtual switch
Non-Uniform Memory Access (NUMA)
reconnaissance phase

Correct Answer:

A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
A method of gaining access to the underlying host through flaws in the hypervisor.
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Used to determine the MAC address associated with an IP address within the sender's network.
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
A common open source protocol used to communicate between switches and a management server.
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Related Questions

Unlock this Answer For Free Now!

View this answer and more for free by performing one of the following actions

qr-code

Scan the QR code to install the App and get 2 free unlocks

upload documents

Unlock quizzes for free by uploading documents