Match each item with a statement below.

A. Used to determine the MAC address associated with an IP address within the sender's network.
B. A method of gaining access to the underlying host through flaws in the hypervisor.
C. A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
D. A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
E. A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
F. A common open source protocol used to communicate between switches and a management server.
G. Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
H. Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
I. A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
J. A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.


A. Address Resolution Protocol (ARP)
B. directory traversal attacks
C. distributed switch
D. internal virtual switch
E. Non-Uniform Memory Access (NUMA)
F. OpenFlow
G. reconnaissance phase
H. scanning phase
I. software-defined network (SDN)
J. VLAN

Computer Science & Information Technology

You might also like to view...

MC The last line number in a traceback indicates the__________ .

a) throw point. b) catch point. c) handle point. d) None of the above.

Computer Science & Information Technology

23. What is software pipelining?

What will be an ideal response?

Computer Science & Information Technology

In a book cipher, the key consists of a list of codes representing the page number, line number, and word number of the plaintext word. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ function calculates the principal payment for a specified period on a loan or investment.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology