Deck 5: Installing and Working With Microsoft Hyper-V

Full screen (f)
exit full mode
Question
What are the two different types of checkpoints?

A) Primary and secondary
B) Standard and production
C) Supplemental and tertiary
D) Production and standby
Use Space or
up arrow
down arrow
to flip the card.
Question
Hyper-V supports the use of a physical floppy drive within virtual machines, much the same way a physical DVD drive can be used to support discs.
Question
Available on both generations of virtual machines, Secure Boot can be used to block unauthorized software and operating systems from running at boot.
Question
When a virtual machine in Hyper-V is saved from the Action menu, where is the virtual machine's memory and state information saved to?

A) They're both saved to a file on the host computer
B) They're both saved to the virtual machine's virtual hard disk file.
C) They're both saved to the virtual machine's configuration file.
D) They're both saved to the guest OS's page file, much like a traditional suspend operation.
Question
When using the Hyper-V hypervisor, what is the default mouse release key combination that will transfer mouse control from the VM back to the host?

A) Ctrl + Home
B) Ctrl + Enter
C) Ctrl + Alt + left arrow
D) Ctrl + Alt + Insert
Question
What version of Windows Server 2016 does not include the Hyper-V role?

A) Windows Server 2016 Standard
B) Windows Server 2016 Datacenter
C) Windows Server 2016 Web
D) Windows Server 2016 Essentials
Question
Virtual machine performance suffers without the installation of Integration Services for Hyper-V VMs.
Question
A virtual machine that is paused on Hyper-V has a saved state, similar to a snapshot, that is reverted to when the virtual machine is resumed.
Question
You have enabled the "Data Exchange" feature within Integration Services for Hyper-V. What registry key is used to pass information back and forth between the guest and the host?

A) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
B) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters
C) HKEY_USERS\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters
D) HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
Question
Where in the Hyper-V Settings window for a virtual machine can you configure the ability of the virtual machine to access local resources on the host computer, such as audio, printers, and USB devices?

A) Peripheral Devices
B) Enhanced Session Mode Policy
C) Hardware Sharing
D) Host Resource Permissions
Question
Diskette drives are only available on generation one virtual machines.
Question
You are getting ready to deploy a virtual machine on a Hyper-V host, and have come to the "Specify Generation" window. What generation should you select if your virtual machine will have a 32-bit guest OS?

A) generation one
B) generation two
C) Both generations will support a 32-bit operating system.
D) Neither generations will support a 32-bit operating system.
Question
Where should you check to ensure that both the DEP/NX bit and hardware virtualization are enabled for your host machine running Windows Server 2016 Standard?

A) The system BIOS configuration screens.
B) Under Control Panel, in the System application.
C) The Microsoft Management Console.
D) Device Manager, under CPU
Question
When using the Hyper-V hypervisor, what virtual switch type is the most restrictive, in that it will not allow communication with even the host?

A) external network
B) isolated network
C) internal network
D) private network
Question
What happens when the "Delete" link is used from the Actions menu in Hyper-V Manager?

A) The virtual machine configuration files and virtual hard disks are deleted.
B) The virtual machine configuration files are removed, but the virtual disk files are left in place.
C) The virtual machine configuration files are retained, but the virtual disk files are deleted.
D) The virtual machine is removed from the list in Hyper-V manager, but both the configuration files and disk files remain intact.
Question
You are attempting to install a Windows Server 2008 guest OS to a SCSI based drive within a generation one virtual machine, however, you find you are unable to perform the install. What is the reason for this failure?

A) Windows Server 2008 does not support the virtual SCSI controller used by generation one VMs in Hyper-V.
B) A SCSI based drive can't be added to a generation one virtual machine.
C) Generation one virtual machines do not support a non-IDE based boot drive.
D) The BIOS of a generation one virtual machine will not recognize the SCSI controller.
Question
What Windows OS is not supported by Microsoft for installation within Hyper-V?

A) Windows Vista Professional Edition SP2
B) Windows 7 Home Edition
C) Windows Server 2008 R2
D) Windows Home Server 2011
Question
What does the Ctrl + Alt + Break key combination do within Hyper-V?

A) It releases the host mouse and keyboard from the VM's management screen.
B) It pauses the currently selected running virtual machine.
C) It performs a paste operation.
D) It toggles the use of the Full Screen Mode.
Question
What statement regarding the installation requirements for Hyper-V is accurate?

A) To install Hyper-V, you need a 32-bit or 64-bit version of Windows Server 2016.
B) You must have a processor that supports SLAT in order to install Hyper-V.
C) Hyper-V does not require the use of a processor with hardware virtualization.
D) Hyper-V will not run on a processor with the DEP/NX bit feature.
Question
What is the default disk type utilized by the Hyper-V hypervisor?

A) differencing disk
B) dynamic disk
C) fixed disk
D) independent disk
Question
Match between columns
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
DEP (Data Execution Prevention)
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
Enlightened I/O
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
AMD-V
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
GPU
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
NUMA spanning
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
differencing disk
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
vfd file
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
dynamic memory
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
replication
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
Trusted Platform Module (TPM)
Hardware virtualization support for AMD processors.
DEP (Data Execution Prevention)
Hardware virtualization support for AMD processors.
Enlightened I/O
Hardware virtualization support for AMD processors.
AMD-V
Hardware virtualization support for AMD processors.
GPU
Hardware virtualization support for AMD processors.
NUMA spanning
Hardware virtualization support for AMD processors.
differencing disk
Hardware virtualization support for AMD processors.
vfd file
Hardware virtualization support for AMD processors.
dynamic memory
Hardware virtualization support for AMD processors.
replication
Hardware virtualization support for AMD processors.
Trusted Platform Module (TPM)
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
DEP (Data Execution Prevention)
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
Enlightened I/O
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
AMD-V
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
GPU
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
NUMA spanning
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
differencing disk
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
vfd file
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
dynamic memory
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
replication
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
Trusted Platform Module (TPM)
A virtual floppy disk file that can be attached to a virtual machine.
DEP (Data Execution Prevention)
A virtual floppy disk file that can be attached to a virtual machine.
Enlightened I/O
A virtual floppy disk file that can be attached to a virtual machine.
AMD-V
A virtual floppy disk file that can be attached to a virtual machine.
GPU
A virtual floppy disk file that can be attached to a virtual machine.
NUMA spanning
A virtual floppy disk file that can be attached to a virtual machine.
differencing disk
A virtual floppy disk file that can be attached to a virtual machine.
vfd file
A virtual floppy disk file that can be attached to a virtual machine.
dynamic memory
A virtual floppy disk file that can be attached to a virtual machine.
replication
A virtual floppy disk file that can be attached to a virtual machine.
Trusted Platform Module (TPM)
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
DEP (Data Execution Prevention)
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
Enlightened I/O
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
AMD-V
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
GPU
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
NUMA spanning
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
differencing disk
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
vfd file
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
dynamic memory
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
replication
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
Trusted Platform Module (TPM)
Special hardware that handles cryptographic keys.
DEP (Data Execution Prevention)
Special hardware that handles cryptographic keys.
Enlightened I/O
Special hardware that handles cryptographic keys.
AMD-V
Special hardware that handles cryptographic keys.
GPU
Special hardware that handles cryptographic keys.
NUMA spanning
Special hardware that handles cryptographic keys.
differencing disk
Special hardware that handles cryptographic keys.
vfd file
Special hardware that handles cryptographic keys.
dynamic memory
Special hardware that handles cryptographic keys.
replication
Special hardware that handles cryptographic keys.
Trusted Platform Module (TPM)
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
DEP (Data Execution Prevention)
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
Enlightened I/O
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
AMD-V
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
GPU
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
NUMA spanning
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
differencing disk
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
vfd file
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
dynamic memory
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
replication
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
Trusted Platform Module (TPM)
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
DEP (Data Execution Prevention)
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
Enlightened I/O
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
AMD-V
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
GPU
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
NUMA spanning
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
differencing disk
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
vfd file
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
dynamic memory
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
replication
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
Trusted Platform Module (TPM)
An option that enables a host PC's memory and processors to be split up into nodes.
DEP (Data Execution Prevention)
An option that enables a host PC's memory and processors to be split up into nodes.
Enlightened I/O
An option that enables a host PC's memory and processors to be split up into nodes.
AMD-V
An option that enables a host PC's memory and processors to be split up into nodes.
GPU
An option that enables a host PC's memory and processors to be split up into nodes.
NUMA spanning
An option that enables a host PC's memory and processors to be split up into nodes.
differencing disk
An option that enables a host PC's memory and processors to be split up into nodes.
vfd file
An option that enables a host PC's memory and processors to be split up into nodes.
dynamic memory
An option that enables a host PC's memory and processors to be split up into nodes.
replication
An option that enables a host PC's memory and processors to be split up into nodes.
Trusted Platform Module (TPM)
A disk that is tied to another disk, and only stores the changes between the two disks.
DEP (Data Execution Prevention)
A disk that is tied to another disk, and only stores the changes between the two disks.
Enlightened I/O
A disk that is tied to another disk, and only stores the changes between the two disks.
AMD-V
A disk that is tied to another disk, and only stores the changes between the two disks.
GPU
A disk that is tied to another disk, and only stores the changes between the two disks.
NUMA spanning
A disk that is tied to another disk, and only stores the changes between the two disks.
differencing disk
A disk that is tied to another disk, and only stores the changes between the two disks.
vfd file
A disk that is tied to another disk, and only stores the changes between the two disks.
dynamic memory
A disk that is tied to another disk, and only stores the changes between the two disks.
replication
A disk that is tied to another disk, and only stores the changes between the two disks.
Trusted Platform Module (TPM)
Question
What statement regarding the use of a generation two virtual machine is accurate?

A) Generation two virtual machines support the use of legacy network adapters.
B) A generation two virtual machine simulates the newer style EFI firmware.
C) A generation two virtual machine will not support a SCSI based DVD drive.
D) A generation two virtual machine does not support the addition of an IDE controller.
Question
What is used to facilitate the use of virtual machine dynamic memory?

A) The virtual hard disk associated with the virtual machine.
B) A registry entry that enables sharing the host's page file with all guest machines.
C) The virtualization features of the processor are used to overload and compress the amount of physical RAM needed for the dynamic memory.
D) The smart paging file, which is normally located in the same directory as the virtual machine configuration files.
Question
What security options exist for a virtual machine within Hyper-V under the Hardware section?
Question
A production type checkpoint within Hyper-V utilizes what service in the guest OS to perform the checkpoint?

A) Windows Backup Service
B) Volume Shadow Copy Service
C) Background Intelligent Transfer Service
D) Integration Services Checkpoint for Windows
Question
What is the difference between the live migrations feature and the storage migration feature within Hyper-V, and what configuration options exist for each in the Hyper-V Settings window?
Question
What are the three import types in Hyper-V?
Question
When you have finished using a virtual machine in Hyper-V, what are your options for ending the session?
Question
How do the two different types of checkpoints available in Hyper-V differ?
Question
What are the installation requirements for Hyper-V when using Windows Server 2016?
Question
Under what menu in the Virtual Machine Connection window can you send a "Ctrl+Alt+Delete" sequence to the guest OS?

A) File
B) Action
C) View
D) Edit
Question
How do virtual COM ports communicate with the host machine on Hyper-V?

A) COM ports communicate via special TCP/IP enabled network adapters on the guest and the host.
B) The serial ports must utilize a special Microsoft USB driver that passes the traffic on the host's USB bus.
C) Communication occurs through a setting in the Windows registry.
D) Communication is done through the use of a named pipe.
Question
What is the difference between the two virtual disk file formats supported by Hyper-V hypervisor?
Question
A user has asked for your assistance in restoring the wizard windows and confirmation messages that they've checked the "Do not show this again" option. Where can this setting be found?

A) Under the Hyper-V Settings dialog box, within the "User" section.
B) Under the Hyper-V Settings dialog box, within the "Server" section.
C) Under the Actions menu, "Reset Check Boxes" option.
D) Under the virtual machine settings window, in the "Management" section.
Question
What are some of the limitations inherent in the use of generation one versus generation two virtual machines?
Question
Where can the settings for the Shielding option on a virtual machine be configured?

A) Under the Hyper-V Settings window for a host, in the Server section.
B) Under the Hyper-V Settings window for a host, in the User section.
C) Under the Settings window for the virtual machine, in the Hardware section.
D) Under the Settings window for the virtual machine, in the Management section.
Question
What configuration settings are available in the Hyper-V Settings Server section, and what does each setting do?
Question
What are the features that are enabled through the use of Integration Services with Hyper-V?
Question
You are about to install a guest OS from a DVD disc. What must you do in order to install the guest OS in a generation two virtual machine?

A) Map the host's DVD drive to a DVD drive in the virtual machine.
B) An IDE controller must be added to the virtual machine, and a DVD player attached to it.
C) An ISO file must be created from the DVD in order to use it with a generation two virtual machine.
D) Nothing, the default configuration for a second generation virtual machine is to use the physical DVD drive as the source for installation.
Question
When using a physical graphics card to accelerate video and 3D rendering in a virtual machine, what role must be added to the server?

A) Virtualized Desktop Infrastructure role
B) Terminal Services role
C) 3D Render Host role
D) Remote Desktop Virtualization role
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Installing and Working With Microsoft Hyper-V
1
What are the two different types of checkpoints?

A) Primary and secondary
B) Standard and production
C) Supplemental and tertiary
D) Production and standby
B
2
Hyper-V supports the use of a physical floppy drive within virtual machines, much the same way a physical DVD drive can be used to support discs.
False
3
Available on both generations of virtual machines, Secure Boot can be used to block unauthorized software and operating systems from running at boot.
False
4
When a virtual machine in Hyper-V is saved from the Action menu, where is the virtual machine's memory and state information saved to?

A) They're both saved to a file on the host computer
B) They're both saved to the virtual machine's virtual hard disk file.
C) They're both saved to the virtual machine's configuration file.
D) They're both saved to the guest OS's page file, much like a traditional suspend operation.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
When using the Hyper-V hypervisor, what is the default mouse release key combination that will transfer mouse control from the VM back to the host?

A) Ctrl + Home
B) Ctrl + Enter
C) Ctrl + Alt + left arrow
D) Ctrl + Alt + Insert
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
What version of Windows Server 2016 does not include the Hyper-V role?

A) Windows Server 2016 Standard
B) Windows Server 2016 Datacenter
C) Windows Server 2016 Web
D) Windows Server 2016 Essentials
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
Virtual machine performance suffers without the installation of Integration Services for Hyper-V VMs.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
A virtual machine that is paused on Hyper-V has a saved state, similar to a snapshot, that is reverted to when the virtual machine is resumed.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
You have enabled the "Data Exchange" feature within Integration Services for Hyper-V. What registry key is used to pass information back and forth between the guest and the host?

A) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
B) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters
C) HKEY_USERS\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters
D) HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
Where in the Hyper-V Settings window for a virtual machine can you configure the ability of the virtual machine to access local resources on the host computer, such as audio, printers, and USB devices?

A) Peripheral Devices
B) Enhanced Session Mode Policy
C) Hardware Sharing
D) Host Resource Permissions
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
Diskette drives are only available on generation one virtual machines.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
You are getting ready to deploy a virtual machine on a Hyper-V host, and have come to the "Specify Generation" window. What generation should you select if your virtual machine will have a 32-bit guest OS?

A) generation one
B) generation two
C) Both generations will support a 32-bit operating system.
D) Neither generations will support a 32-bit operating system.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Where should you check to ensure that both the DEP/NX bit and hardware virtualization are enabled for your host machine running Windows Server 2016 Standard?

A) The system BIOS configuration screens.
B) Under Control Panel, in the System application.
C) The Microsoft Management Console.
D) Device Manager, under CPU
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
When using the Hyper-V hypervisor, what virtual switch type is the most restrictive, in that it will not allow communication with even the host?

A) external network
B) isolated network
C) internal network
D) private network
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
What happens when the "Delete" link is used from the Actions menu in Hyper-V Manager?

A) The virtual machine configuration files and virtual hard disks are deleted.
B) The virtual machine configuration files are removed, but the virtual disk files are left in place.
C) The virtual machine configuration files are retained, but the virtual disk files are deleted.
D) The virtual machine is removed from the list in Hyper-V manager, but both the configuration files and disk files remain intact.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
You are attempting to install a Windows Server 2008 guest OS to a SCSI based drive within a generation one virtual machine, however, you find you are unable to perform the install. What is the reason for this failure?

A) Windows Server 2008 does not support the virtual SCSI controller used by generation one VMs in Hyper-V.
B) A SCSI based drive can't be added to a generation one virtual machine.
C) Generation one virtual machines do not support a non-IDE based boot drive.
D) The BIOS of a generation one virtual machine will not recognize the SCSI controller.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
What Windows OS is not supported by Microsoft for installation within Hyper-V?

A) Windows Vista Professional Edition SP2
B) Windows 7 Home Edition
C) Windows Server 2008 R2
D) Windows Home Server 2011
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
What does the Ctrl + Alt + Break key combination do within Hyper-V?

A) It releases the host mouse and keyboard from the VM's management screen.
B) It pauses the currently selected running virtual machine.
C) It performs a paste operation.
D) It toggles the use of the Full Screen Mode.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
What statement regarding the installation requirements for Hyper-V is accurate?

A) To install Hyper-V, you need a 32-bit or 64-bit version of Windows Server 2016.
B) You must have a processor that supports SLAT in order to install Hyper-V.
C) Hyper-V does not require the use of a processor with hardware virtualization.
D) Hyper-V will not run on a processor with the DEP/NX bit feature.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
What is the default disk type utilized by the Hyper-V hypervisor?

A) differencing disk
B) dynamic disk
C) fixed disk
D) independent disk
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
DEP (Data Execution Prevention)
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
Enlightened I/O
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
AMD-V
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
GPU
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
NUMA spanning
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
differencing disk
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
vfd file
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
dynamic memory
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
replication
Allows a virtual machine on a host to have an exact copy on the local network, or across the Internet, which can be used if the primary virtual machine goes down.
Trusted Platform Module (TPM)
Hardware virtualization support for AMD processors.
DEP (Data Execution Prevention)
Hardware virtualization support for AMD processors.
Enlightened I/O
Hardware virtualization support for AMD processors.
AMD-V
Hardware virtualization support for AMD processors.
GPU
Hardware virtualization support for AMD processors.
NUMA spanning
Hardware virtualization support for AMD processors.
differencing disk
Hardware virtualization support for AMD processors.
vfd file
Hardware virtualization support for AMD processors.
dynamic memory
Hardware virtualization support for AMD processors.
replication
Hardware virtualization support for AMD processors.
Trusted Platform Module (TPM)
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
DEP (Data Execution Prevention)
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
Enlightened I/O
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
AMD-V
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
GPU
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
NUMA spanning
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
differencing disk
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
vfd file
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
dynamic memory
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
replication
A feature supported by some OS kernels to enable guest OS communication with Hyper-V for improved performance.
Trusted Platform Module (TPM)
A virtual floppy disk file that can be attached to a virtual machine.
DEP (Data Execution Prevention)
A virtual floppy disk file that can be attached to a virtual machine.
Enlightened I/O
A virtual floppy disk file that can be attached to a virtual machine.
AMD-V
A virtual floppy disk file that can be attached to a virtual machine.
GPU
A virtual floppy disk file that can be attached to a virtual machine.
NUMA spanning
A virtual floppy disk file that can be attached to a virtual machine.
differencing disk
A virtual floppy disk file that can be attached to a virtual machine.
vfd file
A virtual floppy disk file that can be attached to a virtual machine.
dynamic memory
A virtual floppy disk file that can be attached to a virtual machine.
replication
A virtual floppy disk file that can be attached to a virtual machine.
Trusted Platform Module (TPM)
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
DEP (Data Execution Prevention)
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
Enlightened I/O
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
AMD-V
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
GPU
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
NUMA spanning
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
differencing disk
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
vfd file
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
dynamic memory
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
replication
A video graphics processing unit, can be used to provide accelerated video and 3D rendering.
Trusted Platform Module (TPM)
Special hardware that handles cryptographic keys.
DEP (Data Execution Prevention)
Special hardware that handles cryptographic keys.
Enlightened I/O
Special hardware that handles cryptographic keys.
AMD-V
Special hardware that handles cryptographic keys.
GPU
Special hardware that handles cryptographic keys.
NUMA spanning
Special hardware that handles cryptographic keys.
differencing disk
Special hardware that handles cryptographic keys.
vfd file
Special hardware that handles cryptographic keys.
dynamic memory
Special hardware that handles cryptographic keys.
replication
Special hardware that handles cryptographic keys.
Trusted Platform Module (TPM)
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
DEP (Data Execution Prevention)
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
Enlightened I/O
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
AMD-V
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
GPU
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
NUMA spanning
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
differencing disk
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
vfd file
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
dynamic memory
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
replication
Allows the use of only as much memory as needed, within a specified range, by a virtual machine.
Trusted Platform Module (TPM)
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
DEP (Data Execution Prevention)
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
Enlightened I/O
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
AMD-V
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
GPU
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
NUMA spanning
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
differencing disk
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
vfd file
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
dynamic memory
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
replication
A security feature that prevents malicious software from inserting executable code into sections of memory intended for data storage.
Trusted Platform Module (TPM)
An option that enables a host PC's memory and processors to be split up into nodes.
DEP (Data Execution Prevention)
An option that enables a host PC's memory and processors to be split up into nodes.
Enlightened I/O
An option that enables a host PC's memory and processors to be split up into nodes.
AMD-V
An option that enables a host PC's memory and processors to be split up into nodes.
GPU
An option that enables a host PC's memory and processors to be split up into nodes.
NUMA spanning
An option that enables a host PC's memory and processors to be split up into nodes.
differencing disk
An option that enables a host PC's memory and processors to be split up into nodes.
vfd file
An option that enables a host PC's memory and processors to be split up into nodes.
dynamic memory
An option that enables a host PC's memory and processors to be split up into nodes.
replication
An option that enables a host PC's memory and processors to be split up into nodes.
Trusted Platform Module (TPM)
A disk that is tied to another disk, and only stores the changes between the two disks.
DEP (Data Execution Prevention)
A disk that is tied to another disk, and only stores the changes between the two disks.
Enlightened I/O
A disk that is tied to another disk, and only stores the changes between the two disks.
AMD-V
A disk that is tied to another disk, and only stores the changes between the two disks.
GPU
A disk that is tied to another disk, and only stores the changes between the two disks.
NUMA spanning
A disk that is tied to another disk, and only stores the changes between the two disks.
differencing disk
A disk that is tied to another disk, and only stores the changes between the two disks.
vfd file
A disk that is tied to another disk, and only stores the changes between the two disks.
dynamic memory
A disk that is tied to another disk, and only stores the changes between the two disks.
replication
A disk that is tied to another disk, and only stores the changes between the two disks.
Trusted Platform Module (TPM)
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
What statement regarding the use of a generation two virtual machine is accurate?

A) Generation two virtual machines support the use of legacy network adapters.
B) A generation two virtual machine simulates the newer style EFI firmware.
C) A generation two virtual machine will not support a SCSI based DVD drive.
D) A generation two virtual machine does not support the addition of an IDE controller.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
What is used to facilitate the use of virtual machine dynamic memory?

A) The virtual hard disk associated with the virtual machine.
B) A registry entry that enables sharing the host's page file with all guest machines.
C) The virtualization features of the processor are used to overload and compress the amount of physical RAM needed for the dynamic memory.
D) The smart paging file, which is normally located in the same directory as the virtual machine configuration files.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
What security options exist for a virtual machine within Hyper-V under the Hardware section?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
A production type checkpoint within Hyper-V utilizes what service in the guest OS to perform the checkpoint?

A) Windows Backup Service
B) Volume Shadow Copy Service
C) Background Intelligent Transfer Service
D) Integration Services Checkpoint for Windows
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
What is the difference between the live migrations feature and the storage migration feature within Hyper-V, and what configuration options exist for each in the Hyper-V Settings window?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
What are the three import types in Hyper-V?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
When you have finished using a virtual machine in Hyper-V, what are your options for ending the session?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
How do the two different types of checkpoints available in Hyper-V differ?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
What are the installation requirements for Hyper-V when using Windows Server 2016?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Under what menu in the Virtual Machine Connection window can you send a "Ctrl+Alt+Delete" sequence to the guest OS?

A) File
B) Action
C) View
D) Edit
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
How do virtual COM ports communicate with the host machine on Hyper-V?

A) COM ports communicate via special TCP/IP enabled network adapters on the guest and the host.
B) The serial ports must utilize a special Microsoft USB driver that passes the traffic on the host's USB bus.
C) Communication occurs through a setting in the Windows registry.
D) Communication is done through the use of a named pipe.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
What is the difference between the two virtual disk file formats supported by Hyper-V hypervisor?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
A user has asked for your assistance in restoring the wizard windows and confirmation messages that they've checked the "Do not show this again" option. Where can this setting be found?

A) Under the Hyper-V Settings dialog box, within the "User" section.
B) Under the Hyper-V Settings dialog box, within the "Server" section.
C) Under the Actions menu, "Reset Check Boxes" option.
D) Under the virtual machine settings window, in the "Management" section.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
What are some of the limitations inherent in the use of generation one versus generation two virtual machines?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
Where can the settings for the Shielding option on a virtual machine be configured?

A) Under the Hyper-V Settings window for a host, in the Server section.
B) Under the Hyper-V Settings window for a host, in the User section.
C) Under the Settings window for the virtual machine, in the Hardware section.
D) Under the Settings window for the virtual machine, in the Management section.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
What configuration settings are available in the Hyper-V Settings Server section, and what does each setting do?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
What are the features that are enabled through the use of Integration Services with Hyper-V?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
You are about to install a guest OS from a DVD disc. What must you do in order to install the guest OS in a generation two virtual machine?

A) Map the host's DVD drive to a DVD drive in the virtual machine.
B) An IDE controller must be added to the virtual machine, and a DVD player attached to it.
C) An ISO file must be created from the DVD in order to use it with a generation two virtual machine.
D) Nothing, the default configuration for a second generation virtual machine is to use the physical DVD drive as the source for installation.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
When using a physical graphics card to accelerate video and 3D rendering in a virtual machine, what role must be added to the server?

A) Virtualized Desktop Infrastructure role
B) Terminal Services role
C) 3D Render Host role
D) Remote Desktop Virtualization role
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.