Deck 8: Working With Vmware Vcenter Server
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
Play
Full screen (f)
Deck 8: Working With Vmware Vcenter Server
1
What type of migration involves a virtual machine that is powered off to a different shared data store or data store that is accessible by only one host?
A) suspended migration
B) cold migration
C) Storage vMotion migration
D) Enhanced vMotion migration
A) suspended migration
B) cold migration
C) Storage vMotion migration
D) Enhanced vMotion migration
B
2
A VMFS iSCSI based data store can't be dynamically expanded due to the nature of the VMFS file system structure.
False
3
What statement regarding the vpxa process is accurate?
A) The vpxa process is responsible for managing most of the operations on the ESXi host.
B) The vpxa process controls access to the virtual machines and storage volumes on an ESXi host.
C) The vpxa process serves as an intermediary between the vpxd process and the hostd process.
D) The vpxa process communicates commands from the vSphere client to the hostd process.
A) The vpxa process is responsible for managing most of the operations on the ESXi host.
B) The vpxa process controls access to the virtual machines and storage volumes on an ESXi host.
C) The vpxa process serves as an intermediary between the vpxd process and the hostd process.
D) The vpxa process communicates commands from the vSphere client to the hostd process.
C
4
You are attempting to migrate a virtual machine to a different host. The new host has an Intel processor, while the old host has an AMD processor. What type of migration must be performed?
A) cold migration
B) suspended migration
C) vMotion migration
D) Enhanced vMotion migration
A) cold migration
B) suspended migration
C) vMotion migration
D) Enhanced vMotion migration
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
What guest operating system information does not typically require modification when creating a template?
A) The guest OS hostname
B) The guest OS network settings
C) The guest OS license settings
D) The guest OS partition layout
A) The guest OS hostname
B) The guest OS network settings
C) The guest OS license settings
D) The guest OS partition layout
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
What kind of migration allows a powered-on virtual machine to be moved to a new data store?
A) cold migration
B) suspended migration
C) Storage vMotion migration
D) Enhanced vMotion migrtion
A) cold migration
B) suspended migration
C) Storage vMotion migration
D) Enhanced vMotion migrtion
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
What statement regarding the use of iSCSI extents is accurate?
A) Extents can be added to any VMFS data store, up to 16 extents per data store.
B) An extent can be resized at will, provided there is adequate storage available.
C) A VMFS data store that is created on an extent cannot be resized.
D) A VMFS data store can be expanded as long as there is free space available in the extent.
A) Extents can be added to any VMFS data store, up to 16 extents per data store.
B) An extent can be resized at will, provided there is adequate storage available.
C) A VMFS data store that is created on an extent cannot be resized.
D) A VMFS data store can be expanded as long as there is free space available in the extent.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
After removing a static software based iSCSI target, you discover hours later that the target has been returned to the list of targets. What is the most likely cause?
A) The static target was added via dynamic discovery, and a rescan operation has re-added it.
B) The static target cannot be removed without deleting all associated data stores utilized by the host.
C) You do not have the proper permissions to remove a static target, causing the job to remove the target to fail.
D) The iSCSI initiator cannot remove a target that has been configured by vCenter Server for use on the host.
A) The static target was added via dynamic discovery, and a rescan operation has re-added it.
B) The static target cannot be removed without deleting all associated data stores utilized by the host.
C) You do not have the proper permissions to remove a static target, causing the job to remove the target to fail.
D) The iSCSI initiator cannot remove a target that has been configured by vCenter Server for use on the host.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port?
A) The MAC address aging timer must expire, after which a learning period occurs, and the MAC is registered on the new port.
B) A RARP request is sent to notify the network that the MAC is now on a new port.
C) The host forces the network switch to clear it's MAC address table so that the MAC is flooded out all ports.
D) A multicast packet is sent to notify the network of the change.
A) The MAC address aging timer must expire, after which a learning period occurs, and the MAC is registered on the new port.
B) A RARP request is sent to notify the network that the MAC is now on a new port.
C) The host forces the network switch to clear it's MAC address table so that the MAC is flooded out all ports.
D) A multicast packet is sent to notify the network of the change.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
What is a valid step that should be taken to make using iSCSI technology on a network more secure?
A) The iSCSI traffic should be encrypted using CHAP.
B) The iSCSI traffic should be isolated to a dedicated and separate network.
C) The network should make use of hardware based iSCSI instead of software based iSCSI.
D) The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
A) The iSCSI traffic should be encrypted using CHAP.
B) The iSCSI traffic should be isolated to a dedicated and separate network.
C) The network should make use of hardware based iSCSI instead of software based iSCSI.
D) The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
Some VMware license keys can be split by applying them to multiple assets. For example, a four-CPU license can be split by applying it to 2 two-CPU hosts.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
When creating a cluster of ESXi hosts, what option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts?
A) Clustered Computing Service (CCS)
B) Distributed Resource Scheduler (DRS)
C) Shared Process Threading (SPT)
D) Multi-Host Computing (MHC)
A) Clustered Computing Service (CCS)
B) Distributed Resource Scheduler (DRS)
C) Shared Process Threading (SPT)
D) Multi-Host Computing (MHC)
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use?
A) cold migration
B) suspended migration
C) vMotion migration
D) enhanced vMotion
A) cold migration
B) suspended migration
C) vMotion migration
D) enhanced vMotion
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
What happens when ESXi hosts are put into lockdown mode?
A) No users are able to log into ESXi hosts, they must authenticate with vCenter Server.
B) No users are able to log into ESXi hosts through vCenter, they must log in directly.
C) The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server.
D) The ESXi server no longer allows virtual machine modifications or changes in running state.
A) No users are able to log into ESXi hosts, they must authenticate with vCenter Server.
B) No users are able to log into ESXi hosts through vCenter, they must log in directly.
C) The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server.
D) The ESXi server no longer allows virtual machine modifications or changes in running state.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
What process is responsible for managing most of the operations on an ESXi host?
A) vpxa
B) hostd
C) vpxd
D) kernd
A) vpxa
B) hostd
C) vpxd
D) kernd
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)?
A) A typical NAS has better performance than a SAN.
B) A SAN lacks the more advanced features of a NAS.
C) A SAN is more costly to implement.
D) A SAN cannot make use of the iSCSI protocol.
A) A typical NAS has better performance than a SAN.
B) A SAN lacks the more advanced features of a NAS.
C) A SAN is more costly to implement.
D) A SAN cannot make use of the iSCSI protocol.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
What is the maximum number of extents that can be added to any VMFS data store?
A) 8
B) 16
C) 32
D) 64
A) 8
B) 16
C) 32
D) 64
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the vpxa process.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
How is authorization in vCenter Server handled?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server?
A) privilege
B) role
C) ability
D) trait
A) privilege
B) role
C) ability
D) trait
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
What is NOT a part of the VMware platform services component of vCenter Server?
A) vCenter Single Sign On
B) License service
C) Lookup service
D) Inventory database service
A) vCenter Single Sign On
B) License service
C) Lookup service
D) Inventory database service
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
How do the hostd, vpxa, and vpxd processes interact with each other?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
Describe the differences between a hardware based initiator and a software based initiator.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
What are the steps undertaken by an initiator in order to connect to an iSCSI target?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
While adding a new ESXi host and configuring a NAT adapter, you receive a warning that one or more hosts have no assigned physical network adapters. What should be done?
A) The host has no compatible network adapters, so a dedicated supported adapter should be installed.
B) The "Assign uplink" icon should be selected after the NAT network adapter is added.
C) The vswitch0 virtual switch on the host has no configured adapters.
D) The host's vmnet8 interface is not configured.
A) The host has no compatible network adapters, so a dedicated supported adapter should be installed.
B) The "Assign uplink" icon should be selected after the NAT network adapter is added.
C) The vswitch0 virtual switch on the host has no configured adapters.
D) The host's vmnet8 interface is not configured.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
What term is used to describe the top most object in the vCenter Server inventory?
A) head node
B) root object
C) primary branch
D) top host
A) head node
B) root object
C) primary branch
D) top host
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
Smaller organizations can use which of the following vCenter Server's built in database to manage data center objects?
A) Oracle DB
B) Microsoft SQL Server
C) PostgreSQL Server
D) MySQL Server
A) Oracle DB
B) Microsoft SQL Server
C) PostgreSQL Server
D) MySQL Server
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
What statement regarding the use of lockdown mode is accurate?
A) The root user is still able to log in via the DCUI console.
B) The vCLI and DCUI options are still available for use by any user.
C) A user may access ESXi hosts individually as long as they are members of the "Local Admins" role.
D) The lockdown mode only affects the use of the vCLI.
A) The root user is still able to log in via the DCUI console.
B) The vCLI and DCUI options are still available for use by any user.
C) A user may access ESXi hosts individually as long as they are members of the "Local Admins" role.
D) The lockdown mode only affects the use of the vCLI.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
During installation, the vCenter Server appliance sets up a Single Sign On account using what username?
A) root@domain_name
B) manager@domain_name
C) administrator@domain_name
D) admin@domain_name
A) root@domain_name
B) manager@domain_name
C) administrator@domain_name
D) admin@domain_name
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
What is the difference between a privilege and a role?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
What statement regarding the vCenter Server hardware requirements is accurate?
A) vCenter Server requires a minimum of 8 GB of RAM.
B) vCenter Server requires two CPU cores minimum.
C) vCenter Server requires 240 GB IDE drive space
D) vCenter Server requires two 100 Mbps Ethernet controllers
A) vCenter Server requires a minimum of 8 GB of RAM.
B) vCenter Server requires two CPU cores minimum.
C) vCenter Server requires 240 GB IDE drive space
D) vCenter Server requires two 100 Mbps Ethernet controllers
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
What are the two major components that make up the vCenter Server system?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
When using the VMware vSphere Web Client, what three items are used to display license information?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
What is used by CHAP to verify the identity of a host?
A) A three way handshake and private keys
B) host certificates
C) network MAC address database
D) Pre-approved host list
A) A three way handshake and private keys
B) host certificates
C) network MAC address database
D) Pre-approved host list
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
What are the two supported methods of iSCSI target discovery on ESXi hosts?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
What are the two major ways in which the vCenter Server can be implemented?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
What is NOT a part of the VMware vCenter services component of vCenter Server?
A) Web Client
B) Inventory database service
C) Auto Deploy service
D) VMware Certificate Authority
A) Web Client
B) Inventory database service
C) Auto Deploy service
D) VMware Certificate Authority
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
How is CHAP utilized to provide authentication for the iSCSI technology?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck