Deck 8: Working With Vmware Vcenter Server

Full screen (f)
exit full mode
Question
What type of migration involves a virtual machine that is powered off to a different shared data store or data store that is accessible by only one host?

A) suspended migration
B) cold migration
C) Storage vMotion migration
D) Enhanced vMotion migration
Use Space or
up arrow
down arrow
to flip the card.
Question
A VMFS iSCSI based data store can't be dynamically expanded due to the nature of the VMFS file system structure.
Question
What statement regarding the vpxa process is accurate?

A) The vpxa process is responsible for managing most of the operations on the ESXi host.
B) The vpxa process controls access to the virtual machines and storage volumes on an ESXi host.
C) The vpxa process serves as an intermediary between the vpxd process and the hostd process.
D) The vpxa process communicates commands from the vSphere client to the hostd process.
Question
You are attempting to migrate a virtual machine to a different host. The new host has an Intel processor, while the old host has an AMD processor. What type of migration must be performed?

A) cold migration
B) suspended migration
C) vMotion migration
D) Enhanced vMotion migration
Question
What guest operating system information does not typically require modification when creating a template?

A) The guest OS hostname
B) The guest OS network settings
C) The guest OS license settings
D) The guest OS partition layout
Question
What kind of migration allows a powered-on virtual machine to be moved to a new data store?

A) cold migration
B) suspended migration
C) Storage vMotion migration
D) Enhanced vMotion migrtion
Question
What statement regarding the use of iSCSI extents is accurate?

A) Extents can be added to any VMFS data store, up to 16 extents per data store.
B) An extent can be resized at will, provided there is adequate storage available.
C) A VMFS data store that is created on an extent cannot be resized.
D) A VMFS data store can be expanded as long as there is free space available in the extent.
Question
After removing a static software based iSCSI target, you discover hours later that the target has been returned to the list of targets. What is the most likely cause?

A) The static target was added via dynamic discovery, and a rescan operation has re-added it.
B) The static target cannot be removed without deleting all associated data stores utilized by the host.
C) You do not have the proper permissions to remove a static target, causing the job to remove the target to fail.
D) The iSCSI initiator cannot remove a target that has been configured by vCenter Server for use on the host.
Question
After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port?

A) The MAC address aging timer must expire, after which a learning period occurs, and the MAC is registered on the new port.
B) A RARP request is sent to notify the network that the MAC is now on a new port.
C) The host forces the network switch to clear it's MAC address table so that the MAC is flooded out all ports.
D) A multicast packet is sent to notify the network of the change.
Question
Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller.
Question
What is a valid step that should be taken to make using iSCSI technology on a network more secure?

A) The iSCSI traffic should be encrypted using CHAP.
B) The iSCSI traffic should be isolated to a dedicated and separate network.
C) The network should make use of hardware based iSCSI instead of software based iSCSI.
D) The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
Question
The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server.
Question
Some VMware license keys can be split by applying them to multiple assets. For example, a four-CPU license can be split by applying it to 2 two-CPU hosts.
Question
When creating a cluster of ESXi hosts, what option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts?

A) Clustered Computing Service (CCS)
B) Distributed Resource Scheduler (DRS)
C) Shared Process Threading (SPT)
D) Multi-Host Computing (MHC)
Question
You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use?

A) cold migration
B) suspended migration
C) vMotion migration
D) enhanced vMotion
Question
What happens when ESXi hosts are put into lockdown mode?

A) No users are able to log into ESXi hosts, they must authenticate with vCenter Server.
B) No users are able to log into ESXi hosts through vCenter, they must log in directly.
C) The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server.
D) The ESXi server no longer allows virtual machine modifications or changes in running state.
Question
What process is responsible for managing most of the operations on an ESXi host?

A) vpxa
B) hostd
C) vpxd
D) kernd
Question
What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)?

A) A typical NAS has better performance than a SAN.
B) A SAN lacks the more advanced features of a NAS.
C) A SAN is more costly to implement.
D) A SAN cannot make use of the iSCSI protocol.
Question
What is the maximum number of extents that can be added to any VMFS data store?

A) 8
B) 16
C) 32
D) 64
Question
When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the vpxa process.
Question
Match between columns
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
Challenge Handshake Authentication Protocol (CHAP)
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
dynamic discovery
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
Embedded Platform Services Controller
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
extent
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
External Platform Services Controller
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
host bus adapter (HBA)
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
software iSCSI initiator
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
static discover
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
thin-provisioned
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
role
A hardware based iSCSI initiator.
Challenge Handshake Authentication Protocol (CHAP)
A hardware based iSCSI initiator.
dynamic discovery
A hardware based iSCSI initiator.
Embedded Platform Services Controller
A hardware based iSCSI initiator.
extent
A hardware based iSCSI initiator.
External Platform Services Controller
A hardware based iSCSI initiator.
host bus adapter (HBA)
A hardware based iSCSI initiator.
software iSCSI initiator
A hardware based iSCSI initiator.
static discover
A hardware based iSCSI initiator.
thin-provisioned
A hardware based iSCSI initiator.
role
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
Challenge Handshake Authentication Protocol (CHAP)
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
dynamic discovery
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
Embedded Platform Services Controller
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
extent
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
External Platform Services Controller
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
host bus adapter (HBA)
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
software iSCSI initiator
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
static discover
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
thin-provisioned
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
role
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
Challenge Handshake Authentication Protocol (CHAP)
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
dynamic discovery
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
Embedded Platform Services Controller
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
extent
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
External Platform Services Controller
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
host bus adapter (HBA)
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
software iSCSI initiator
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
static discover
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
thin-provisioned
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
role
The name for when the platform services controller is installed on a separate server from the vCenter Server.
Challenge Handshake Authentication Protocol (CHAP)
The name for when the platform services controller is installed on a separate server from the vCenter Server.
dynamic discovery
The name for when the platform services controller is installed on a separate server from the vCenter Server.
Embedded Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
extent
The name for when the platform services controller is installed on a separate server from the vCenter Server.
External Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
host bus adapter (HBA)
The name for when the platform services controller is installed on a separate server from the vCenter Server.
software iSCSI initiator
The name for when the platform services controller is installed on a separate server from the vCenter Server.
static discover
The name for when the platform services controller is installed on a separate server from the vCenter Server.
thin-provisioned
The name for when the platform services controller is installed on a separate server from the vCenter Server.
role
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
Challenge Handshake Authentication Protocol (CHAP)
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
dynamic discovery
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
Embedded Platform Services Controller
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
extent
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
External Platform Services Controller
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
host bus adapter (HBA)
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
software iSCSI initiator
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
static discover
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
thin-provisioned
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
role
A way to make the most of your data store capacity by allowing for overallocation.
Challenge Handshake Authentication Protocol (CHAP)
A way to make the most of your data store capacity by allowing for overallocation.
dynamic discovery
A way to make the most of your data store capacity by allowing for overallocation.
Embedded Platform Services Controller
A way to make the most of your data store capacity by allowing for overallocation.
extent
A way to make the most of your data store capacity by allowing for overallocation.
External Platform Services Controller
A way to make the most of your data store capacity by allowing for overallocation.
host bus adapter (HBA)
A way to make the most of your data store capacity by allowing for overallocation.
software iSCSI initiator
A way to make the most of your data store capacity by allowing for overallocation.
static discover
A way to make the most of your data store capacity by allowing for overallocation.
thin-provisioned
A way to make the most of your data store capacity by allowing for overallocation.
role
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
Challenge Handshake Authentication Protocol (CHAP)
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
dynamic discovery
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
Embedded Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
extent
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
External Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
host bus adapter (HBA)
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
software iSCSI initiator
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
static discover
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
thin-provisioned
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
role
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
Challenge Handshake Authentication Protocol (CHAP)
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
dynamic discovery
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
Embedded Platform Services Controller
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
extent
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
External Platform Services Controller
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
host bus adapter (HBA)
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
software iSCSI initiator
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
static discover
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
thin-provisioned
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
role
A partition on a storage device (called a LUN in iSCSI terminology).
Challenge Handshake Authentication Protocol (CHAP)
A partition on a storage device (called a LUN in iSCSI terminology).
dynamic discovery
A partition on a storage device (called a LUN in iSCSI terminology).
Embedded Platform Services Controller
A partition on a storage device (called a LUN in iSCSI terminology).
extent
A partition on a storage device (called a LUN in iSCSI terminology).
External Platform Services Controller
A partition on a storage device (called a LUN in iSCSI terminology).
host bus adapter (HBA)
A partition on a storage device (called a LUN in iSCSI terminology).
software iSCSI initiator
A partition on a storage device (called a LUN in iSCSI terminology).
static discover
A partition on a storage device (called a LUN in iSCSI terminology).
thin-provisioned
A partition on a storage device (called a LUN in iSCSI terminology).
role
Question
How is authorization in vCenter Server handled?
Question
What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server?

A) privilege
B) role
C) ability
D) trait
Question
What is NOT a part of the VMware platform services component of vCenter Server?

A) vCenter Single Sign On
B) License service
C) Lookup service
D) Inventory database service
Question
How do the hostd, vpxa, and vpxd processes interact with each other?
Question
Describe the differences between a hardware based initiator and a software based initiator.
Question
What are the steps undertaken by an initiator in order to connect to an iSCSI target?
Question
While adding a new ESXi host and configuring a NAT adapter, you receive a warning that one or more hosts have no assigned physical network adapters. What should be done?

A) The host has no compatible network adapters, so a dedicated supported adapter should be installed.
B) The "Assign uplink" icon should be selected after the NAT network adapter is added.
C) The vswitch0 virtual switch on the host has no configured adapters.
D) The host's vmnet8 interface is not configured.
Question
What term is used to describe the top most object in the vCenter Server inventory?

A) head node
B) root object
C) primary branch
D) top host
Question
Smaller organizations can use which of the following vCenter Server's built in database to manage data center objects?

A) Oracle DB
B) Microsoft SQL Server
C) PostgreSQL Server
D) MySQL Server
Question
What statement regarding the use of lockdown mode is accurate?

A) The root user is still able to log in via the DCUI console.
B) The vCLI and DCUI options are still available for use by any user.
C) A user may access ESXi hosts individually as long as they are members of the "Local Admins" role.
D) The lockdown mode only affects the use of the vCLI.
Question
During installation, the vCenter Server appliance sets up a Single Sign On account using what username?

A) root@domain_name
B) manager@domain_name
C) administrator@domain_name
D) admin@domain_name
Question
What is the difference between a privilege and a role?
Question
What statement regarding the vCenter Server hardware requirements is accurate?

A) vCenter Server requires a minimum of 8 GB of RAM.
B) vCenter Server requires two CPU cores minimum.
C) vCenter Server requires 240 GB IDE drive space
D) vCenter Server requires two 100 Mbps Ethernet controllers
Question
What are the two major components that make up the vCenter Server system?
Question
When using the VMware vSphere Web Client, what three items are used to display license information?
Question
What is used by CHAP to verify the identity of a host?

A) A three way handshake and private keys
B) host certificates
C) network MAC address database
D) Pre-approved host list
Question
What are the two supported methods of iSCSI target discovery on ESXi hosts?
Question
What are the two major ways in which the vCenter Server can be implemented?
Question
What is NOT a part of the VMware vCenter services component of vCenter Server?

A) Web Client
B) Inventory database service
C) Auto Deploy service
D) VMware Certificate Authority
Question
How is CHAP utilized to provide authentication for the iSCSI technology?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Working With Vmware Vcenter Server
1
What type of migration involves a virtual machine that is powered off to a different shared data store or data store that is accessible by only one host?

A) suspended migration
B) cold migration
C) Storage vMotion migration
D) Enhanced vMotion migration
B
2
A VMFS iSCSI based data store can't be dynamically expanded due to the nature of the VMFS file system structure.
False
3
What statement regarding the vpxa process is accurate?

A) The vpxa process is responsible for managing most of the operations on the ESXi host.
B) The vpxa process controls access to the virtual machines and storage volumes on an ESXi host.
C) The vpxa process serves as an intermediary between the vpxd process and the hostd process.
D) The vpxa process communicates commands from the vSphere client to the hostd process.
C
4
You are attempting to migrate a virtual machine to a different host. The new host has an Intel processor, while the old host has an AMD processor. What type of migration must be performed?

A) cold migration
B) suspended migration
C) vMotion migration
D) Enhanced vMotion migration
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
What guest operating system information does not typically require modification when creating a template?

A) The guest OS hostname
B) The guest OS network settings
C) The guest OS license settings
D) The guest OS partition layout
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
What kind of migration allows a powered-on virtual machine to be moved to a new data store?

A) cold migration
B) suspended migration
C) Storage vMotion migration
D) Enhanced vMotion migrtion
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
What statement regarding the use of iSCSI extents is accurate?

A) Extents can be added to any VMFS data store, up to 16 extents per data store.
B) An extent can be resized at will, provided there is adequate storage available.
C) A VMFS data store that is created on an extent cannot be resized.
D) A VMFS data store can be expanded as long as there is free space available in the extent.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
After removing a static software based iSCSI target, you discover hours later that the target has been returned to the list of targets. What is the most likely cause?

A) The static target was added via dynamic discovery, and a rescan operation has re-added it.
B) The static target cannot be removed without deleting all associated data stores utilized by the host.
C) You do not have the proper permissions to remove a static target, causing the job to remove the target to fail.
D) The iSCSI initiator cannot remove a target that has been configured by vCenter Server for use on the host.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port?

A) The MAC address aging timer must expire, after which a learning period occurs, and the MAC is registered on the new port.
B) A RARP request is sent to notify the network that the MAC is now on a new port.
C) The host forces the network switch to clear it's MAC address table so that the MAC is flooded out all ports.
D) A multicast packet is sent to notify the network of the change.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
What is a valid step that should be taken to make using iSCSI technology on a network more secure?

A) The iSCSI traffic should be encrypted using CHAP.
B) The iSCSI traffic should be isolated to a dedicated and separate network.
C) The network should make use of hardware based iSCSI instead of software based iSCSI.
D) The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
Some VMware license keys can be split by applying them to multiple assets. For example, a four-CPU license can be split by applying it to 2 two-CPU hosts.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
When creating a cluster of ESXi hosts, what option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts?

A) Clustered Computing Service (CCS)
B) Distributed Resource Scheduler (DRS)
C) Shared Process Threading (SPT)
D) Multi-Host Computing (MHC)
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use?

A) cold migration
B) suspended migration
C) vMotion migration
D) enhanced vMotion
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
What happens when ESXi hosts are put into lockdown mode?

A) No users are able to log into ESXi hosts, they must authenticate with vCenter Server.
B) No users are able to log into ESXi hosts through vCenter, they must log in directly.
C) The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server.
D) The ESXi server no longer allows virtual machine modifications or changes in running state.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
What process is responsible for managing most of the operations on an ESXi host?

A) vpxa
B) hostd
C) vpxd
D) kernd
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)?

A) A typical NAS has better performance than a SAN.
B) A SAN lacks the more advanced features of a NAS.
C) A SAN is more costly to implement.
D) A SAN cannot make use of the iSCSI protocol.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
What is the maximum number of extents that can be added to any VMFS data store?

A) 8
B) 16
C) 32
D) 64
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the vpxa process.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
Challenge Handshake Authentication Protocol (CHAP)
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
dynamic discovery
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
Embedded Platform Services Controller
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
extent
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
External Platform Services Controller
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
host bus adapter (HBA)
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
software iSCSI initiator
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
static discover
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
thin-provisioned
Uses a three-way handshake algorithm to verify the identity of a host, and if applicable, an iSCSI target.
role
A hardware based iSCSI initiator.
Challenge Handshake Authentication Protocol (CHAP)
A hardware based iSCSI initiator.
dynamic discovery
A hardware based iSCSI initiator.
Embedded Platform Services Controller
A hardware based iSCSI initiator.
extent
A hardware based iSCSI initiator.
External Platform Services Controller
A hardware based iSCSI initiator.
host bus adapter (HBA)
A hardware based iSCSI initiator.
software iSCSI initiator
A hardware based iSCSI initiator.
static discover
A hardware based iSCSI initiator.
thin-provisioned
A hardware based iSCSI initiator.
role
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
Challenge Handshake Authentication Protocol (CHAP)
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
dynamic discovery
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
Embedded Platform Services Controller
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
extent
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
External Platform Services Controller
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
host bus adapter (HBA)
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
software iSCSI initiator
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
static discover
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
thin-provisioned
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
role
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
Challenge Handshake Authentication Protocol (CHAP)
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
dynamic discovery
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
Embedded Platform Services Controller
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
extent
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
External Platform Services Controller
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
host bus adapter (HBA)
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
software iSCSI initiator
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
static discover
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
thin-provisioned
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
role
The name for when the platform services controller is installed on a separate server from the vCenter Server.
Challenge Handshake Authentication Protocol (CHAP)
The name for when the platform services controller is installed on a separate server from the vCenter Server.
dynamic discovery
The name for when the platform services controller is installed on a separate server from the vCenter Server.
Embedded Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
extent
The name for when the platform services controller is installed on a separate server from the vCenter Server.
External Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
host bus adapter (HBA)
The name for when the platform services controller is installed on a separate server from the vCenter Server.
software iSCSI initiator
The name for when the platform services controller is installed on a separate server from the vCenter Server.
static discover
The name for when the platform services controller is installed on a separate server from the vCenter Server.
thin-provisioned
The name for when the platform services controller is installed on a separate server from the vCenter Server.
role
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
Challenge Handshake Authentication Protocol (CHAP)
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
dynamic discovery
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
Embedded Platform Services Controller
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
extent
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
External Platform Services Controller
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
host bus adapter (HBA)
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
software iSCSI initiator
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
static discover
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
thin-provisioned
A collection of privileges that provide a way to aggregate all the individual privileges that are required to perform a higher-level task.
role
A way to make the most of your data store capacity by allowing for overallocation.
Challenge Handshake Authentication Protocol (CHAP)
A way to make the most of your data store capacity by allowing for overallocation.
dynamic discovery
A way to make the most of your data store capacity by allowing for overallocation.
Embedded Platform Services Controller
A way to make the most of your data store capacity by allowing for overallocation.
extent
A way to make the most of your data store capacity by allowing for overallocation.
External Platform Services Controller
A way to make the most of your data store capacity by allowing for overallocation.
host bus adapter (HBA)
A way to make the most of your data store capacity by allowing for overallocation.
software iSCSI initiator
A way to make the most of your data store capacity by allowing for overallocation.
static discover
A way to make the most of your data store capacity by allowing for overallocation.
thin-provisioned
A way to make the most of your data store capacity by allowing for overallocation.
role
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
Challenge Handshake Authentication Protocol (CHAP)
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
dynamic discovery
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
Embedded Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
extent
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
External Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
host bus adapter (HBA)
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
software iSCSI initiator
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
static discover
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
thin-provisioned
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
role
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
Challenge Handshake Authentication Protocol (CHAP)
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
dynamic discovery
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
Embedded Platform Services Controller
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
extent
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
External Platform Services Controller
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
host bus adapter (HBA)
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
software iSCSI initiator
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
static discover
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
thin-provisioned
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
role
A partition on a storage device (called a LUN in iSCSI terminology).
Challenge Handshake Authentication Protocol (CHAP)
A partition on a storage device (called a LUN in iSCSI terminology).
dynamic discovery
A partition on a storage device (called a LUN in iSCSI terminology).
Embedded Platform Services Controller
A partition on a storage device (called a LUN in iSCSI terminology).
extent
A partition on a storage device (called a LUN in iSCSI terminology).
External Platform Services Controller
A partition on a storage device (called a LUN in iSCSI terminology).
host bus adapter (HBA)
A partition on a storage device (called a LUN in iSCSI terminology).
software iSCSI initiator
A partition on a storage device (called a LUN in iSCSI terminology).
static discover
A partition on a storage device (called a LUN in iSCSI terminology).
thin-provisioned
A partition on a storage device (called a LUN in iSCSI terminology).
role
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
How is authorization in vCenter Server handled?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server?

A) privilege
B) role
C) ability
D) trait
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
What is NOT a part of the VMware platform services component of vCenter Server?

A) vCenter Single Sign On
B) License service
C) Lookup service
D) Inventory database service
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
How do the hostd, vpxa, and vpxd processes interact with each other?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
Describe the differences between a hardware based initiator and a software based initiator.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
What are the steps undertaken by an initiator in order to connect to an iSCSI target?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
While adding a new ESXi host and configuring a NAT adapter, you receive a warning that one or more hosts have no assigned physical network adapters. What should be done?

A) The host has no compatible network adapters, so a dedicated supported adapter should be installed.
B) The "Assign uplink" icon should be selected after the NAT network adapter is added.
C) The vswitch0 virtual switch on the host has no configured adapters.
D) The host's vmnet8 interface is not configured.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
What term is used to describe the top most object in the vCenter Server inventory?

A) head node
B) root object
C) primary branch
D) top host
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
Smaller organizations can use which of the following vCenter Server's built in database to manage data center objects?

A) Oracle DB
B) Microsoft SQL Server
C) PostgreSQL Server
D) MySQL Server
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
What statement regarding the use of lockdown mode is accurate?

A) The root user is still able to log in via the DCUI console.
B) The vCLI and DCUI options are still available for use by any user.
C) A user may access ESXi hosts individually as long as they are members of the "Local Admins" role.
D) The lockdown mode only affects the use of the vCLI.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
During installation, the vCenter Server appliance sets up a Single Sign On account using what username?

A) root@domain_name
B) manager@domain_name
C) administrator@domain_name
D) admin@domain_name
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
What is the difference between a privilege and a role?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
What statement regarding the vCenter Server hardware requirements is accurate?

A) vCenter Server requires a minimum of 8 GB of RAM.
B) vCenter Server requires two CPU cores minimum.
C) vCenter Server requires 240 GB IDE drive space
D) vCenter Server requires two 100 Mbps Ethernet controllers
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
What are the two major components that make up the vCenter Server system?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
When using the VMware vSphere Web Client, what three items are used to display license information?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
What is used by CHAP to verify the identity of a host?

A) A three way handshake and private keys
B) host certificates
C) network MAC address database
D) Pre-approved host list
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
What are the two supported methods of iSCSI target discovery on ESXi hosts?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
What are the two major ways in which the vCenter Server can be implemented?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
What is NOT a part of the VMware vCenter services component of vCenter Server?

A) Web Client
B) Inventory database service
C) Auto Deploy service
D) VMware Certificate Authority
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
How is CHAP utilized to provide authentication for the iSCSI technology?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 41 flashcards in this deck.