Deck 4: Data Center Virtualization and Cloud Computing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
Play
Full screen (f)
Deck 4: Data Center Virtualization and Cloud Computing
1
What sort of network policy should you utilize in vSphere if your intent is to limit the amount of bandwidth a virtual machine is allowed to use?
A) network security policy
B) network NIC teaming policy
C) network flow policy
D) network traffic shaping policy
A) network security policy
B) network NIC teaming policy
C) network flow policy
D) network traffic shaping policy
D
2
What DRS mode has the ability to move VMs to other ESXi hosts based on a preset performance threshold rating, requiring no actions on behalf of an ESXi administrator?
A) Automatic
B) Semi-automatic
C) Manual
D) Preset
A) Automatic
B) Semi-automatic
C) Manual
D) Preset
A
3
Worms are viruses that are operating at the same privilege as the hypervisor and have methods to hide from detection by anti-virus software.
False
4
What feature, available in Windows 7 and Windows Server 2008 and later allows the guest OS to communicate directly with a hypervisor, for increased features and improved performance?
A) Non-Uniform Memory Access (NUMA)
B) Second Level Address Translation (SLAT)
C) Enlightened I/O
D) Transparent Page Sharing
A) Non-Uniform Memory Access (NUMA)
B) Second Level Address Translation (SLAT)
C) Enlightened I/O
D) Transparent Page Sharing
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
What statement regarding the use of iSCSI networks is not accurate?
A) Entities on an iSCSI network are referred to as nodes.
B) Each target must have an iSCSI qualified Name (IQN) or Extended Unique Identifier.
C) The iSCSI target is a single physical disk that is assigned a LUN.
D) LUNs are connected to a TCP/IP network using one or more Storage Processors.
A) Entities on an iSCSI network are referred to as nodes.
B) Each target must have an iSCSI qualified Name (IQN) or Extended Unique Identifier.
C) The iSCSI target is a single physical disk that is assigned a LUN.
D) LUNs are connected to a TCP/IP network using one or more Storage Processors.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
How is the iSCSI connection process typically made secure?
A) The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B) The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C) The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D) The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.
A) The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B) The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C) The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D) The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
The reconnaissance phase of an attack occurs from outside of the network.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
What component serves as the core of the vSphere ESXi hypervisor?
A) vSphere Core
B) VMKernel
C) vOS embedded
D) vMotion AOS
A) vSphere Core
B) VMKernel
C) vOS embedded
D) vMotion AOS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
A NIC can be assigned to more than one virtual switch.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
What advanced virtual hard disk format, introduced by Windows Server 2012 R2, provides increased storage capacity of up to 64 TB per VM disk, improved performance, and security?
A) VHD
B) VMDK
C) VDI
D) VHDX
A) VHD
B) VMDK
C) VDI
D) VHDX
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
You are using a network attached storage (NAS) system for virtual machine storage. What protocol can you use with VMware ESXi to access the files on the NAS?
A) AFP
B) NFSv3
C) CIFS
D) SMB
A) AFP
B) NFSv3
C) CIFS
D) SMB
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
The network ID is the same for all computers that share a network.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
When using Microsoft Hyper-V, what type of virtual switch should you utilize if you want to limit communication of a virtual machine to only virtual machines running on the host?
A) private virtual switch
B) internal virtual switch
C) external virtual switch
D) local virtual switch
A) private virtual switch
B) internal virtual switch
C) external virtual switch
D) local virtual switch
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
What hypervisor does NOT include a DHCP service for use with virtual machines?
A) VMware Workstation
B) VirtualBox
C) VMware vSphere
D) VMware Fusion
A) VMware Workstation
B) VirtualBox
C) VMware vSphere
D) VMware Fusion
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
What virtualization product supports the use of 4-KB disk sectors within virtual drives, allowing the virtual machine to take advantage of increased storage capacity?
A) VMware vSphere
B) Oracle VirtualBox
C) XenWorks
D) Microsoft Hyper-V
A) VMware vSphere
B) Oracle VirtualBox
C) XenWorks
D) Microsoft Hyper-V
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
You have just turned on a virtual machine and after determining that a network issue exists, you discover that the virtual machine is using the IP address of 169.254.141.259, with a subnet mask of 255.255.0.0, and no default gateway has been set. What is the issue?
A) The default gateway should be configured to 169.254.1.1 in order to access the network.
B) The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address.
C) The virtual machine is using an IP address in the loopback address range.
D) The virtual machine is using the wrong subnet mask for the class of IP address configured.
A) The default gateway should be configured to 169.254.1.1 in order to access the network.
B) The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address.
C) The virtual machine is using an IP address in the loopback address range.
D) The virtual machine is using the wrong subnet mask for the class of IP address configured.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
What statement regarding the use of IPv4 is accurate?
A) IPv4 utilizes a 48-bit address to communicate on the network.
B) IPv4 utilizes a 128-bit address to communicate on the network.
C) The 127.0.0.1 address is reserved as a loopback address.
D) The subnet mask is used to determine what networks are public and what networks are private.
A) IPv4 utilizes a 48-bit address to communicate on the network.
B) IPv4 utilizes a 128-bit address to communicate on the network.
C) The 127.0.0.1 address is reserved as a loopback address.
D) The subnet mask is used to determine what networks are public and what networks are private.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
What statement reflects a valid approach to improving performance and security on a virtual server that accesses shared storage over the network, in addition to providing networking services?
A) The host should be placed in a special VLAN along with the storage to isolate access.
B) The host should be configured to use the same virtual network switch for both accessing shared storage and providing services.
C) The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services.
D) The host should be configured to use separate network adapters for accessing storage and providing services.
A) The host should be placed in a special VLAN along with the storage to isolate access.
B) The host should be configured to use the same virtual network switch for both accessing shared storage and providing services.
C) The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services.
D) The host should be configured to use separate network adapters for accessing storage and providing services.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
Both vSphere 6.0 and Hyper-V provide checkpoint merge capability which allows a snapshot to be applied to a running VM without the need to shut down and restart.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
What private IP address range is a Class B private IP range?
A) 10.0.0.0 to 10.255.255.0
B) 172.16.0.0 to 172.31.0.0
C) 192.168.1.0 to 192.168.254.0
D) 224.0.0.0 to 254.0.0.0
A) 10.0.0.0 to 10.255.255.0
B) 172.16.0.0 to 172.31.0.0
C) 192.168.1.0 to 192.168.254.0
D) 224.0.0.0 to 254.0.0.0
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases?
A) pivoting phase
B) scanning phase
C) exploitation phase
D) reconnaissance phase
A) pivoting phase
B) scanning phase
C) exploitation phase
D) reconnaissance phase
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
The process of storing a single copy of a data sector and then using reference pointers to access this data from other locations is known by what term?
A) data deduplication
B) storage tiering
C) hard linking
D) sector overloading
A) data deduplication
B) storage tiering
C) hard linking
D) sector overloading
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
What is a trunk port, and why is it necessary when using VLANs?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
You are attempting to move a vSphere virtual machine stored in a VMFS formatted iSCSI volume to a workstation running VMware Workstation 12 Pro. What must be done to the VM before it can be moved?
A) Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved.
B) The virtual disk must be converted to a .vmdk file prior to it being moved from the volume.
C) The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location.
D) The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application.
A) Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved.
B) The virtual disk must be converted to a .vmdk file prior to it being moved from the volume.
C) The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location.
D) The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
What VMware vSphere technology allows you to move not only a running virtual machine to a different vSphere host, but also the files associated with the virtual machines to a different data store?
A) vMotion
B) Storage vMotion
C) VMware FT
D) VMware DRS
A) vMotion
B) Storage vMotion
C) VMware FT
D) VMware DRS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
What type of malware is a virus that operates at the same privilege as the hypervisor and utilizes various methods to hide from detection?
A) worm
B) rootkit
C) adware
D) trojan
A) worm
B) rootkit
C) adware
D) trojan
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
What VMware technology is used by VMware FT to keep the secondary virtual machine up to date with the active primary virtual machine?
A) VMware vMotion
B) VMware vLockstep
C) VMware VMFS
D) VMware vSync
A) VMware vMotion
B) VMware vLockstep
C) VMware VMFS
D) VMware vSync
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
Under what conditions can you dynamically change the number of vCPUs or memory available to a guest OS?
A) The host's hardware must support hot add features via VT-x.
B) The host must be using a type-2 hypervisor.
C) The guest OS must be installed in a UEFI enabled VM.
D) The guest OS must support the dynamic addition of CPUs and memory.
A) The host's hardware must support hot add features via VT-x.
B) The host must be using a type-2 hypervisor.
C) The guest OS must be installed in a UEFI enabled VM.
D) The guest OS must support the dynamic addition of CPUs and memory.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
How does the use of a Storage Area Network (SAN) differ from the use of a Network Attached Storage (NAS) device?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
What is the Distributed Resource Scheduler feature available in vSphere?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
What does the VMware Transparent Page Sharing (TPS) feature do?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
What are the two different types of Storage Area Network system?
A) CIFS and SMB
B) Fibre Channel and iSCSI
C) iSCSI and NFSv3
D) NFSv3 and Samba
A) CIFS and SMB
B) Fibre Channel and iSCSI
C) iSCSI and NFSv3
D) NFSv3 and Samba
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
What statement regarding the use of an IDS is not accurate?
A) An IDS examines all packets on a virtual network.
B) An IDS can detect a denial of service attack.
C) An IDS can detect a virtual machine that is infected by a worm.
D) An IDS improves performance of a virtual network.
A) An IDS examines all packets on a virtual network.
B) An IDS can detect a denial of service attack.
C) An IDS can detect a virtual machine that is infected by a worm.
D) An IDS improves performance of a virtual network.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
What are the benefits of utilizing Virtual LANs to divide a network?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
What is the VMware file system (VMFS), and what advantages does it provide over the use of traditional file systems?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
What role does the iSCSI initiator play in establishing a connection to an iSCSI target?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
What are frames, and how are MAC addresses used to receive a frame on the network?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline?
A) VMware AlwaysOn
B) VMware vCluster
C) VMware vMotion
D) VMware FT
A) VMware AlwaysOn
B) VMware vCluster
C) VMware vMotion
D) VMware FT
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
What is hyperconvergence, and how does it affect the data center environment?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
How does the use of storage tiering affect the performance of virtual machines?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck