Exam 4: Data Center Virtualization and Cloud Computing

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Worms are viruses that are operating at the same privilege as the hypervisor and have methods to hide from detection by anti-virus software.

(True/False)
4.8/5
(42)

What is hyperconvergence, and how does it affect the data center environment?

(Essay)
4.9/5
(32)

Under what conditions can you dynamically change the number of vCPUs or memory available to a guest OS?

(Multiple Choice)
4.8/5
(37)

What is the Distributed Resource Scheduler feature available in vSphere?

(Essay)
4.8/5
(37)

A NIC can be assigned to more than one virtual switch.

(True/False)
4.8/5
(37)

The network ID is the same for all computers that share a network.

(True/False)
4.8/5
(27)

What is a trunk port, and why is it necessary when using VLANs?

(Essay)
4.8/5
(31)

What component serves as the core of the vSphere ESXi hypervisor?

(Multiple Choice)
4.9/5
(29)

What virtualization product supports the use of 4-KB disk sectors within virtual drives, allowing the virtual machine to take advantage of increased storage capacity?

(Multiple Choice)
5.0/5
(26)

What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases?

(Multiple Choice)
4.9/5
(40)

What feature, available in Windows 7 and Windows Server 2008 and later allows the guest OS to communicate directly with a hypervisor, for increased features and improved performance?

(Multiple Choice)
5.0/5
(30)

The process of storing a single copy of a data sector and then using reference pointers to access this data from other locations is known by what term?

(Multiple Choice)
4.7/5
(36)

How does the use of a Storage Area Network (SAN) differ from the use of a Network Attached Storage (NAS) device?

(Essay)
4.8/5
(28)

You have just turned on a virtual machine and after determining that a network issue exists, you discover that the virtual machine is using the IP address of 169.254.141.259, with a subnet mask of 255.255.0.0, and no default gateway has been set. What is the issue?

(Multiple Choice)
4.9/5
(37)

What type of malware is a virus that operates at the same privilege as the hypervisor and utilizes various methods to hide from detection?

(Multiple Choice)
4.9/5
(34)

What are the two different types of Storage Area Network system?

(Multiple Choice)
4.9/5
(29)

What DRS mode has the ability to move VMs to other ESXi hosts based on a preset performance threshold rating, requiring no actions on behalf of an ESXi administrator?

(Multiple Choice)
4.8/5
(38)

What role does the iSCSI initiator play in establishing a connection to an iSCSI target?

(Essay)
4.8/5
(38)

When using Microsoft Hyper-V, what type of virtual switch should you utilize if you want to limit communication of a virtual machine to only virtual machines running on the host?

(Multiple Choice)
4.8/5
(37)

What advanced virtual hard disk format, introduced by Windows Server 2012 R2, provides increased storage capacity of up to 64 TB per VM disk, improved performance, and security?

(Multiple Choice)
4.8/5
(31)
Showing 21 - 40 of 41
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)