Deck 4: Data Center Virtualization and Cloud Computing

Full screen (f)
exit full mode
Question
What sort of network policy should you utilize in vSphere if your intent is to limit the amount of bandwidth a virtual machine is allowed to use?

A) network security policy
B) network NIC teaming policy
C) network flow policy
D) network traffic shaping policy
Use Space or
up arrow
down arrow
to flip the card.
Question
What DRS mode has the ability to move VMs to other ESXi hosts based on a preset performance threshold rating, requiring no actions on behalf of an ESXi administrator?

A) Automatic
B) Semi-automatic
C) Manual
D) Preset
Question
Worms are viruses that are operating at the same privilege as the hypervisor and have methods to hide from detection by anti-virus software.
Question
What feature, available in Windows 7 and Windows Server 2008 and later allows the guest OS to communicate directly with a hypervisor, for increased features and improved performance?

A) Non-Uniform Memory Access (NUMA)
B) Second Level Address Translation (SLAT)
C) Enlightened I/O
D) Transparent Page Sharing
Question
What statement regarding the use of iSCSI networks is not accurate?

A) Entities on an iSCSI network are referred to as nodes.
B) Each target must have an iSCSI qualified Name (IQN) or Extended Unique Identifier.
C) The iSCSI target is a single physical disk that is assigned a LUN.
D) LUNs are connected to a TCP/IP network using one or more Storage Processors.
Question
How is the iSCSI connection process typically made secure?

A) The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B) The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C) The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D) The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.
Question
The reconnaissance phase of an attack occurs from outside of the network.
Question
What component serves as the core of the vSphere ESXi hypervisor?

A) vSphere Core
B) VMKernel
C) vOS embedded
D) vMotion AOS
Question
A NIC can be assigned to more than one virtual switch.
Question
What advanced virtual hard disk format, introduced by Windows Server 2012 R2, provides increased storage capacity of up to 64 TB per VM disk, improved performance, and security?

A) VHD
B) VMDK
C) VDI
D) VHDX
Question
You are using a network attached storage (NAS) system for virtual machine storage. What protocol can you use with VMware ESXi to access the files on the NAS?

A) AFP
B) NFSv3
C) CIFS
D) SMB
Question
The network ID is the same for all computers that share a network.
Question
When using Microsoft Hyper-V, what type of virtual switch should you utilize if you want to limit communication of a virtual machine to only virtual machines running on the host?

A) private virtual switch
B) internal virtual switch
C) external virtual switch
D) local virtual switch
Question
What hypervisor does NOT include a DHCP service for use with virtual machines?

A) VMware Workstation
B) VirtualBox
C) VMware vSphere
D) VMware Fusion
Question
What virtualization product supports the use of 4-KB disk sectors within virtual drives, allowing the virtual machine to take advantage of increased storage capacity?

A) VMware vSphere
B) Oracle VirtualBox
C) XenWorks
D) Microsoft Hyper-V
Question
You have just turned on a virtual machine and after determining that a network issue exists, you discover that the virtual machine is using the IP address of 169.254.141.259, with a subnet mask of 255.255.0.0, and no default gateway has been set. What is the issue?

A) The default gateway should be configured to 169.254.1.1 in order to access the network.
B) The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address.
C) The virtual machine is using an IP address in the loopback address range.
D) The virtual machine is using the wrong subnet mask for the class of IP address configured.
Question
What statement regarding the use of IPv4 is accurate?

A) IPv4 utilizes a 48-bit address to communicate on the network.
B) IPv4 utilizes a 128-bit address to communicate on the network.
C) The 127.0.0.1 address is reserved as a loopback address.
D) The subnet mask is used to determine what networks are public and what networks are private.
Question
What statement reflects a valid approach to improving performance and security on a virtual server that accesses shared storage over the network, in addition to providing networking services?

A) The host should be placed in a special VLAN along with the storage to isolate access.
B) The host should be configured to use the same virtual network switch for both accessing shared storage and providing services.
C) The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services.
D) The host should be configured to use separate network adapters for accessing storage and providing services.
Question
Both vSphere 6.0 and Hyper-V provide checkpoint merge capability which allows a snapshot to be applied to a running VM without the need to shut down and restart.
Question
What private IP address range is a Class B private IP range?

A) 10.0.0.0 to 10.255.255.0
B) 172.16.0.0 to 172.31.0.0
C) 192.168.1.0 to 192.168.254.0
D) 224.0.0.0 to 254.0.0.0
Question
Match between columns
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
Address Resolution Protocol (ARP)
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
directory traversal attacks
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
distributed switch
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
internal virtual switch
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
Non-Uniform Memory Access (NUMA)
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
OpenFlow
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
reconnaissance phase
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
scanning phase
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
software-defined network (SDN)
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
VLAN
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
Address Resolution Protocol (ARP)
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
directory traversal attacks
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
distributed switch
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
internal virtual switch
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
Non-Uniform Memory Access (NUMA)
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
OpenFlow
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
reconnaissance phase
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
scanning phase
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
software-defined network (SDN)
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
VLAN
A method of gaining access to the underlying host through flaws in the hypervisor.
Address Resolution Protocol (ARP)
A method of gaining access to the underlying host through flaws in the hypervisor.
directory traversal attacks
A method of gaining access to the underlying host through flaws in the hypervisor.
distributed switch
A method of gaining access to the underlying host through flaws in the hypervisor.
internal virtual switch
A method of gaining access to the underlying host through flaws in the hypervisor.
Non-Uniform Memory Access (NUMA)
A method of gaining access to the underlying host through flaws in the hypervisor.
OpenFlow
A method of gaining access to the underlying host through flaws in the hypervisor.
reconnaissance phase
A method of gaining access to the underlying host through flaws in the hypervisor.
scanning phase
A method of gaining access to the underlying host through flaws in the hypervisor.
software-defined network (SDN)
A method of gaining access to the underlying host through flaws in the hypervisor.
VLAN
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Address Resolution Protocol (ARP)
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
directory traversal attacks
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
distributed switch
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
internal virtual switch
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Non-Uniform Memory Access (NUMA)
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
OpenFlow
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
reconnaissance phase
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
scanning phase
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
software-defined network (SDN)
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
VLAN
Used to determine the MAC address associated with an IP address within the sender's network.
Address Resolution Protocol (ARP)
Used to determine the MAC address associated with an IP address within the sender's network.
directory traversal attacks
Used to determine the MAC address associated with an IP address within the sender's network.
distributed switch
Used to determine the MAC address associated with an IP address within the sender's network.
internal virtual switch
Used to determine the MAC address associated with an IP address within the sender's network.
Non-Uniform Memory Access (NUMA)
Used to determine the MAC address associated with an IP address within the sender's network.
OpenFlow
Used to determine the MAC address associated with an IP address within the sender's network.
reconnaissance phase
Used to determine the MAC address associated with an IP address within the sender's network.
scanning phase
Used to determine the MAC address associated with an IP address within the sender's network.
software-defined network (SDN)
Used to determine the MAC address associated with an IP address within the sender's network.
VLAN
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Address Resolution Protocol (ARP)
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
directory traversal attacks
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
distributed switch
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
internal virtual switch
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Non-Uniform Memory Access (NUMA)
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
OpenFlow
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
reconnaissance phase
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
scanning phase
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
software-defined network (SDN)
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
VLAN
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
Address Resolution Protocol (ARP)
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
directory traversal attacks
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
distributed switch
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
internal virtual switch
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
Non-Uniform Memory Access (NUMA)
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
OpenFlow
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
reconnaissance phase
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
scanning phase
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
software-defined network (SDN)
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
VLAN
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
Address Resolution Protocol (ARP)
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
directory traversal attacks
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
distributed switch
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
internal virtual switch
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
Non-Uniform Memory Access (NUMA)
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
OpenFlow
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
reconnaissance phase
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
scanning phase
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
software-defined network (SDN)
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
VLAN
A common open source protocol used to communicate between switches and a management server.
Address Resolution Protocol (ARP)
A common open source protocol used to communicate between switches and a management server.
directory traversal attacks
A common open source protocol used to communicate between switches and a management server.
distributed switch
A common open source protocol used to communicate between switches and a management server.
internal virtual switch
A common open source protocol used to communicate between switches and a management server.
Non-Uniform Memory Access (NUMA)
A common open source protocol used to communicate between switches and a management server.
OpenFlow
A common open source protocol used to communicate between switches and a management server.
reconnaissance phase
A common open source protocol used to communicate between switches and a management server.
scanning phase
A common open source protocol used to communicate between switches and a management server.
software-defined network (SDN)
A common open source protocol used to communicate between switches and a management server.
VLAN
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Address Resolution Protocol (ARP)
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
directory traversal attacks
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
distributed switch
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
internal virtual switch
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Non-Uniform Memory Access (NUMA)
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
OpenFlow
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
reconnaissance phase
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
scanning phase
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
software-defined network (SDN)
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
VLAN
Question
What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases?

A) pivoting phase
B) scanning phase
C) exploitation phase
D) reconnaissance phase
Question
The process of storing a single copy of a data sector and then using reference pointers to access this data from other locations is known by what term?

A) data deduplication
B) storage tiering
C) hard linking
D) sector overloading
Question
What is a trunk port, and why is it necessary when using VLANs?
Question
You are attempting to move a vSphere virtual machine stored in a VMFS formatted iSCSI volume to a workstation running VMware Workstation 12 Pro. What must be done to the VM before it can be moved?

A) Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved.
B) The virtual disk must be converted to a .vmdk file prior to it being moved from the volume.
C) The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location.
D) The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application.
Question
What VMware vSphere technology allows you to move not only a running virtual machine to a different vSphere host, but also the files associated with the virtual machines to a different data store?

A) vMotion
B) Storage vMotion
C) VMware FT
D) VMware DRS
Question
What type of malware is a virus that operates at the same privilege as the hypervisor and utilizes various methods to hide from detection?

A) worm
B) rootkit
C) adware
D) trojan
Question
What VMware technology is used by VMware FT to keep the secondary virtual machine up to date with the active primary virtual machine?

A) VMware vMotion
B) VMware vLockstep
C) VMware VMFS
D) VMware vSync
Question
Under what conditions can you dynamically change the number of vCPUs or memory available to a guest OS?

A) The host's hardware must support hot add features via VT-x.
B) The host must be using a type-2 hypervisor.
C) The guest OS must be installed in a UEFI enabled VM.
D) The guest OS must support the dynamic addition of CPUs and memory.
Question
How does the use of a Storage Area Network (SAN) differ from the use of a Network Attached Storage (NAS) device?
Question
What is the Distributed Resource Scheduler feature available in vSphere?
Question
What does the VMware Transparent Page Sharing (TPS) feature do?
Question
What are the two different types of Storage Area Network system?

A) CIFS and SMB
B) Fibre Channel and iSCSI
C) iSCSI and NFSv3
D) NFSv3 and Samba
Question
What statement regarding the use of an IDS is not accurate?

A) An IDS examines all packets on a virtual network.
B) An IDS can detect a denial of service attack.
C) An IDS can detect a virtual machine that is infected by a worm.
D) An IDS improves performance of a virtual network.
Question
What are the benefits of utilizing Virtual LANs to divide a network?
Question
What is the VMware file system (VMFS), and what advantages does it provide over the use of traditional file systems?
Question
What role does the iSCSI initiator play in establishing a connection to an iSCSI target?
Question
What are frames, and how are MAC addresses used to receive a frame on the network?
Question
What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline?

A) VMware AlwaysOn
B) VMware vCluster
C) VMware vMotion
D) VMware FT
Question
What is hyperconvergence, and how does it affect the data center environment?
Question
How does the use of storage tiering affect the performance of virtual machines?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Data Center Virtualization and Cloud Computing
1
What sort of network policy should you utilize in vSphere if your intent is to limit the amount of bandwidth a virtual machine is allowed to use?

A) network security policy
B) network NIC teaming policy
C) network flow policy
D) network traffic shaping policy
D
2
What DRS mode has the ability to move VMs to other ESXi hosts based on a preset performance threshold rating, requiring no actions on behalf of an ESXi administrator?

A) Automatic
B) Semi-automatic
C) Manual
D) Preset
A
3
Worms are viruses that are operating at the same privilege as the hypervisor and have methods to hide from detection by anti-virus software.
False
4
What feature, available in Windows 7 and Windows Server 2008 and later allows the guest OS to communicate directly with a hypervisor, for increased features and improved performance?

A) Non-Uniform Memory Access (NUMA)
B) Second Level Address Translation (SLAT)
C) Enlightened I/O
D) Transparent Page Sharing
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
What statement regarding the use of iSCSI networks is not accurate?

A) Entities on an iSCSI network are referred to as nodes.
B) Each target must have an iSCSI qualified Name (IQN) or Extended Unique Identifier.
C) The iSCSI target is a single physical disk that is assigned a LUN.
D) LUNs are connected to a TCP/IP network using one or more Storage Processors.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
How is the iSCSI connection process typically made secure?

A) The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B) The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C) The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D) The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
The reconnaissance phase of an attack occurs from outside of the network.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
What component serves as the core of the vSphere ESXi hypervisor?

A) vSphere Core
B) VMKernel
C) vOS embedded
D) vMotion AOS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
A NIC can be assigned to more than one virtual switch.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
What advanced virtual hard disk format, introduced by Windows Server 2012 R2, provides increased storage capacity of up to 64 TB per VM disk, improved performance, and security?

A) VHD
B) VMDK
C) VDI
D) VHDX
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
You are using a network attached storage (NAS) system for virtual machine storage. What protocol can you use with VMware ESXi to access the files on the NAS?

A) AFP
B) NFSv3
C) CIFS
D) SMB
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
The network ID is the same for all computers that share a network.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
When using Microsoft Hyper-V, what type of virtual switch should you utilize if you want to limit communication of a virtual machine to only virtual machines running on the host?

A) private virtual switch
B) internal virtual switch
C) external virtual switch
D) local virtual switch
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
What hypervisor does NOT include a DHCP service for use with virtual machines?

A) VMware Workstation
B) VirtualBox
C) VMware vSphere
D) VMware Fusion
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
What virtualization product supports the use of 4-KB disk sectors within virtual drives, allowing the virtual machine to take advantage of increased storage capacity?

A) VMware vSphere
B) Oracle VirtualBox
C) XenWorks
D) Microsoft Hyper-V
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
You have just turned on a virtual machine and after determining that a network issue exists, you discover that the virtual machine is using the IP address of 169.254.141.259, with a subnet mask of 255.255.0.0, and no default gateway has been set. What is the issue?

A) The default gateway should be configured to 169.254.1.1 in order to access the network.
B) The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address.
C) The virtual machine is using an IP address in the loopback address range.
D) The virtual machine is using the wrong subnet mask for the class of IP address configured.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
What statement regarding the use of IPv4 is accurate?

A) IPv4 utilizes a 48-bit address to communicate on the network.
B) IPv4 utilizes a 128-bit address to communicate on the network.
C) The 127.0.0.1 address is reserved as a loopback address.
D) The subnet mask is used to determine what networks are public and what networks are private.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
What statement reflects a valid approach to improving performance and security on a virtual server that accesses shared storage over the network, in addition to providing networking services?

A) The host should be placed in a special VLAN along with the storage to isolate access.
B) The host should be configured to use the same virtual network switch for both accessing shared storage and providing services.
C) The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services.
D) The host should be configured to use separate network adapters for accessing storage and providing services.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
Both vSphere 6.0 and Hyper-V provide checkpoint merge capability which allows a snapshot to be applied to a running VM without the need to shut down and restart.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
What private IP address range is a Class B private IP range?

A) 10.0.0.0 to 10.255.255.0
B) 172.16.0.0 to 172.31.0.0
C) 192.168.1.0 to 192.168.254.0
D) 224.0.0.0 to 254.0.0.0
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
Address Resolution Protocol (ARP)
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
directory traversal attacks
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
distributed switch
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
internal virtual switch
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
Non-Uniform Memory Access (NUMA)
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
OpenFlow
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
reconnaissance phase
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
scanning phase
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
software-defined network (SDN)
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
VLAN
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
Address Resolution Protocol (ARP)
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
directory traversal attacks
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
distributed switch
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
internal virtual switch
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
Non-Uniform Memory Access (NUMA)
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
OpenFlow
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
reconnaissance phase
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
scanning phase
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
software-defined network (SDN)
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
VLAN
A method of gaining access to the underlying host through flaws in the hypervisor.
Address Resolution Protocol (ARP)
A method of gaining access to the underlying host through flaws in the hypervisor.
directory traversal attacks
A method of gaining access to the underlying host through flaws in the hypervisor.
distributed switch
A method of gaining access to the underlying host through flaws in the hypervisor.
internal virtual switch
A method of gaining access to the underlying host through flaws in the hypervisor.
Non-Uniform Memory Access (NUMA)
A method of gaining access to the underlying host through flaws in the hypervisor.
OpenFlow
A method of gaining access to the underlying host through flaws in the hypervisor.
reconnaissance phase
A method of gaining access to the underlying host through flaws in the hypervisor.
scanning phase
A method of gaining access to the underlying host through flaws in the hypervisor.
software-defined network (SDN)
A method of gaining access to the underlying host through flaws in the hypervisor.
VLAN
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Address Resolution Protocol (ARP)
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
directory traversal attacks
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
distributed switch
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
internal virtual switch
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Non-Uniform Memory Access (NUMA)
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
OpenFlow
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
reconnaissance phase
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
scanning phase
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
software-defined network (SDN)
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
VLAN
Used to determine the MAC address associated with an IP address within the sender's network.
Address Resolution Protocol (ARP)
Used to determine the MAC address associated with an IP address within the sender's network.
directory traversal attacks
Used to determine the MAC address associated with an IP address within the sender's network.
distributed switch
Used to determine the MAC address associated with an IP address within the sender's network.
internal virtual switch
Used to determine the MAC address associated with an IP address within the sender's network.
Non-Uniform Memory Access (NUMA)
Used to determine the MAC address associated with an IP address within the sender's network.
OpenFlow
Used to determine the MAC address associated with an IP address within the sender's network.
reconnaissance phase
Used to determine the MAC address associated with an IP address within the sender's network.
scanning phase
Used to determine the MAC address associated with an IP address within the sender's network.
software-defined network (SDN)
Used to determine the MAC address associated with an IP address within the sender's network.
VLAN
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Address Resolution Protocol (ARP)
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
directory traversal attacks
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
distributed switch
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
internal virtual switch
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Non-Uniform Memory Access (NUMA)
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
OpenFlow
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
reconnaissance phase
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
scanning phase
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
software-defined network (SDN)
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
VLAN
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
Address Resolution Protocol (ARP)
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
directory traversal attacks
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
distributed switch
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
internal virtual switch
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
Non-Uniform Memory Access (NUMA)
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
OpenFlow
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
reconnaissance phase
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
scanning phase
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
software-defined network (SDN)
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
VLAN
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
Address Resolution Protocol (ARP)
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
directory traversal attacks
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
distributed switch
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
internal virtual switch
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
Non-Uniform Memory Access (NUMA)
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
OpenFlow
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
reconnaissance phase
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
scanning phase
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
software-defined network (SDN)
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
VLAN
A common open source protocol used to communicate between switches and a management server.
Address Resolution Protocol (ARP)
A common open source protocol used to communicate between switches and a management server.
directory traversal attacks
A common open source protocol used to communicate between switches and a management server.
distributed switch
A common open source protocol used to communicate between switches and a management server.
internal virtual switch
A common open source protocol used to communicate between switches and a management server.
Non-Uniform Memory Access (NUMA)
A common open source protocol used to communicate between switches and a management server.
OpenFlow
A common open source protocol used to communicate between switches and a management server.
reconnaissance phase
A common open source protocol used to communicate between switches and a management server.
scanning phase
A common open source protocol used to communicate between switches and a management server.
software-defined network (SDN)
A common open source protocol used to communicate between switches and a management server.
VLAN
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Address Resolution Protocol (ARP)
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
directory traversal attacks
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
distributed switch
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
internal virtual switch
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Non-Uniform Memory Access (NUMA)
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
OpenFlow
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
reconnaissance phase
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
scanning phase
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
software-defined network (SDN)
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
VLAN
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases?

A) pivoting phase
B) scanning phase
C) exploitation phase
D) reconnaissance phase
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
The process of storing a single copy of a data sector and then using reference pointers to access this data from other locations is known by what term?

A) data deduplication
B) storage tiering
C) hard linking
D) sector overloading
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
What is a trunk port, and why is it necessary when using VLANs?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
You are attempting to move a vSphere virtual machine stored in a VMFS formatted iSCSI volume to a workstation running VMware Workstation 12 Pro. What must be done to the VM before it can be moved?

A) Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved.
B) The virtual disk must be converted to a .vmdk file prior to it being moved from the volume.
C) The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location.
D) The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
What VMware vSphere technology allows you to move not only a running virtual machine to a different vSphere host, but also the files associated with the virtual machines to a different data store?

A) vMotion
B) Storage vMotion
C) VMware FT
D) VMware DRS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
What type of malware is a virus that operates at the same privilege as the hypervisor and utilizes various methods to hide from detection?

A) worm
B) rootkit
C) adware
D) trojan
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
What VMware technology is used by VMware FT to keep the secondary virtual machine up to date with the active primary virtual machine?

A) VMware vMotion
B) VMware vLockstep
C) VMware VMFS
D) VMware vSync
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
Under what conditions can you dynamically change the number of vCPUs or memory available to a guest OS?

A) The host's hardware must support hot add features via VT-x.
B) The host must be using a type-2 hypervisor.
C) The guest OS must be installed in a UEFI enabled VM.
D) The guest OS must support the dynamic addition of CPUs and memory.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
How does the use of a Storage Area Network (SAN) differ from the use of a Network Attached Storage (NAS) device?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
What is the Distributed Resource Scheduler feature available in vSphere?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
What does the VMware Transparent Page Sharing (TPS) feature do?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
What are the two different types of Storage Area Network system?

A) CIFS and SMB
B) Fibre Channel and iSCSI
C) iSCSI and NFSv3
D) NFSv3 and Samba
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
What statement regarding the use of an IDS is not accurate?

A) An IDS examines all packets on a virtual network.
B) An IDS can detect a denial of service attack.
C) An IDS can detect a virtual machine that is infected by a worm.
D) An IDS improves performance of a virtual network.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
What are the benefits of utilizing Virtual LANs to divide a network?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
What is the VMware file system (VMFS), and what advantages does it provide over the use of traditional file systems?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
What role does the iSCSI initiator play in establishing a connection to an iSCSI target?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
What are frames, and how are MAC addresses used to receive a frame on the network?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline?

A) VMware AlwaysOn
B) VMware vCluster
C) VMware vMotion
D) VMware FT
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
What is hyperconvergence, and how does it affect the data center environment?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
How does the use of storage tiering affect the performance of virtual machines?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 41 flashcards in this deck.