Match each item with a statement below.

A. Used to determine the MAC address associated with an IP address within the sender's network.
B. A method of gaining access to the underlying host through flaws in the hypervisor.
C. A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
D. A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
E. A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
F. A common open source protocol used to communicate between switches and a management server.
G. Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
H. Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
I. A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
J. A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.

A. Address Resolution Protocol (ARP)
B. directory traversal attacks
C. distributed switch
D. internal virtual switch
E. Non-Uniform Memory Access (NUMA)
F. OpenFlow
G. reconnaissance phase
H. scanning phase
I. software-defined network (SDN)
J. VLAN

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a timing option setting available for a slide object?

A) Determine how an animation is triggered B) Set the animation to rewind C) Set the method for starting an animation D) Set the animation to repeat unlimited times

Computer Science & Information Technology

The statement of compliance or noncompliance with certain specifications or other requirements must be included in a report

Indicate whether the statement is true or false.

Computer Science & Information Technology