A server team is standing up a new Type 1 hypervisor so several legacy guest OSs can download updates from the Internet. For security, the guests must be unreachable from other devices on the corporate LAN and should not consume additional DHCP scopes. Which virtual network configuration on the hypervisor best satisfies these requirements?
Configure host-only networking so the VMs communicate only with the hypervisor.
Place each virtual machine on a bridged adapter that receives its own LAN address.
Attach the virtual machines to a NAT-configured virtual switch.
Enable NIC teaming with LACP on the hypervisor's physical adapters.
A NAT-based virtual switch lets all guests share the host's physical NIC and IP address for outbound traffic, so they can reach external update servers without drawing extra leases from the production DHCP pool. Because the VMs sit behind the hypervisor's NAT, unsolicited inbound sessions from the LAN are blocked, keeping them isolated. Bridged networking would expose each VM directly on the LAN, host-only networking provides no Internet access, and NIC teaming only adds link redundancy without addressing isolation or DHCP consumption.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is NAT-based virtual switching the best option for this scenario?
Open an interactive chat with Bash
How does a bridged adapter differ from a NAT adapter in virtual networking?
Open an interactive chat with Bash
What is host-only networking, and why isn't it suitable here?