Deck 7: Working With Vmware Vsphere
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
Play
Full screen (f)
Deck 7: Working With Vmware Vsphere
1
What command can you use to add a comma separated list of users to an ESXi server using VCLI?
A) vicfg-user --adduser -l
B) viuser-cfg --add --type=user
C) vicfg-adduser
D) vicfg-user -u
A) vicfg-user --adduser -l
B) viuser-cfg --add --type=user
C) vicfg-adduser
D) vicfg-user -u
D
2
What traffic shaping policy option determines the number of kilobits per second to allow across a port, averaged over time?
A) average bandwidth
B) average peak bandwidth
C) burst size
D) average throughput
A) average bandwidth
B) average peak bandwidth
C) burst size
D) average throughput
A
3
A virtual machine providing services for your network was recently hacked and used to spoof MAC addresses on your network to target other systems. What policies could you set to prevent this from reoccurring?
A) The MAC address changes and forged transmits policies should be set to "Reject".
B) The promiscuous mode and MAC address changes policies should be set to "Reject".
C) The promiscuous mode and the forged transmits policies should be set to "Reject"
D) Only the promiscuous mode needs to be set to reject.
A) The MAC address changes and forged transmits policies should be set to "Reject".
B) The promiscuous mode and MAC address changes policies should be set to "Reject".
C) The promiscuous mode and the forged transmits policies should be set to "Reject"
D) Only the promiscuous mode needs to be set to reject.
A
4
What is NOT one of the valid choices available for ESXi's virtual SCSI adapter?
A) BusLogic Parallel
B) LSI Logic Parallel
C) LSI Logic SAS
D) BusLogic SAS
A) BusLogic Parallel
B) LSI Logic Parallel
C) LSI Logic SAS
D) BusLogic SAS
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
What are the two GUI clients provided by VMware for use with vSphere?
A) Direct Console User Interface (DCUI) and vSphere User Frontend
B) visual CLI and vSphere Client
C) vSphere Controller and vSphere Web Client
D) vSphere Web client and vSphere Client
A) Direct Console User Interface (DCUI) and vSphere User Frontend
B) visual CLI and vSphere Client
C) vSphere Controller and vSphere Web Client
D) vSphere Web client and vSphere Client
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
VMware vSphere 6 provides support for USB 3.0 devices in virtual machines.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
What virtual machine configuration file holds the virtual machine's snapshot state information?
A) VM_name.vmsd
B) VM_name.vmss
C) VM_name.vswp
D) VM_name.vmdk
A) VM_name.vmsd
B) VM_name.vmss
C) VM_name.vswp
D) VM_name.vmdk
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
What traffic shaping policy option determines the max number of kilobits per second to allow across a port when it is sending a burst of traffic?
A) burst size
B) average bandwidth
C) peak bandwidth
D) surge bandwidth
A) burst size
B) average bandwidth
C) peak bandwidth
D) surge bandwidth
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
NIC teaming policies are set for an entire standard switch, and cannot be changed at the port group level.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
Each VMkernel port must be configured with its own IP address and gateway.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support?
A) A web server with multiple virtual host configurations.
B) An e-mail server that utilizes load balancing features.
C) A clustered application that shares its IP address with other instances.
D) A network monitoring application such as an intrusion detection system (IDS).
A) A web server with multiple virtual host configurations.
B) An e-mail server that utilizes load balancing features.
C) A clustered application that shares its IP address with other instances.
D) A network monitoring application such as an intrusion detection system (IDS).
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
What are the two major console interfaces used to work with an ESXi host?
A) Direct Console User Interface (DCUI) and vCLI
B) vSphere Remote Console and vTerminal
C) vSphere ESXi Control Center and vSphere Shell Interface
D) Remote Access Client (RAC) and vConsole
A) Direct Console User Interface (DCUI) and vCLI
B) vSphere Remote Console and vTerminal
C) vSphere ESXi Control Center and vSphere Shell Interface
D) Remote Access Client (RAC) and vConsole
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
You are using a gigabit Ethernet adapter (vmnic1) on an ESXi host, and you have found that the status screen displays the adapter as being connected at 100 Mb, full duplex. You have verified that the switch your server connects to has 1 Gbps capable ports. What is most likely the problem?
A) The adapter has been manually configured to a speed of 100 Mb, duplex operation.
B) The adapter's driver in ESXi does not have 1 Gbps capability.
C) The cable connecting the server and switch is damaged.
D) The virtual machine using vmnic1 has limited the speed of the interface.
A) The adapter has been manually configured to a speed of 100 Mb, duplex operation.
B) The adapter's driver in ESXi does not have 1 Gbps capability.
C) The cable connecting the server and switch is damaged.
D) The virtual machine using vmnic1 has limited the speed of the interface.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
A standard vSphere virtual switch can have a maximum of 120 ports.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
You are configuring a Linux based 64-bit virtual machine for use on a vSphere host. Based on this information, what will be the default network adapter type and why?
A) The default will be vmxnet to provide basic support for networking.
B) The vlance adapter will be used, because it is the most compatible.
C) The e1000 adapter type will be used, because it is the default for 64-bit guest operating systems.
D) The vmxnet3 adapter type will be used, because Linux has a built in driver.
A) The default will be vmxnet to provide basic support for networking.
B) The vlance adapter will be used, because it is the most compatible.
C) The e1000 adapter type will be used, because it is the default for 64-bit guest operating systems.
D) The vmxnet3 adapter type will be used, because Linux has a built in driver.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
You are attempting to utilize a packet capturing software in your studies of a network's traffic, however, your virtual machine running on vSphere is unable to put the network adapter in promiscuous mode. What is the most likely reason for the failure?
A) A network security policy is preventing the use of a promiscuous mode interface.
B) vSphere does not support the use of promiscuous mode devices.
C) vSphere is connected to the network via a switch, and therefore cannot change to promiscuous mode.
D) The virtual machine hardware compatibility mode is limiting the virtual machine to legacy adapters.
A) A network security policy is preventing the use of a promiscuous mode interface.
B) vSphere does not support the use of promiscuous mode devices.
C) vSphere is connected to the network via a switch, and therefore cannot change to promiscuous mode.
D) The virtual machine hardware compatibility mode is limiting the virtual machine to legacy adapters.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
The e1000 network adapter type is the default adapter used by vSphere for virtual machines that run 64-but guest operating systems.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
You are trying to support a VOIP application on a virtual machine, and need to prioritize VOIP traffic. What kind of virtual switch policy should you use?
A) NIC teaming policy
B) traffic shaping policy
C) security policy
D) application priority policy
A) NIC teaming policy
B) traffic shaping policy
C) security policy
D) application priority policy
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
When running the vmkfstools command with the --server option pointing to a vCenter Server system, what option should be used to select the proper ESXi host to run the command against?
A) --esxi
B) --vihost
C) --targethost
D) --destsrv
A) --esxi
B) --vihost
C) --targethost
D) --destsrv
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file?
A) It is replaced by a .vmtx template configuration file.
B) It is supplemented by a .vmtx file, as both files are required to define the VM.
C) Nothing; vSphere templates are created using information in a sub directory of the VM.
D) It is modified to include the settings required for creating the template.
A) It is replaced by a .vmtx template configuration file.
B) It is supplemented by a .vmtx file, as both files are required to define the VM.
C) Nothing; vSphere templates are created using information in a sub directory of the VM.
D) It is modified to include the settings required for creating the template.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
What virtual disk file type takes the longest to create?
A) thick provision lazy zeroed
B) thick provision eager zeroed
C) thin provision lazy zeroed
D) independent provision
A) thick provision lazy zeroed
B) thick provision eager zeroed
C) thin provision lazy zeroed
D) independent provision
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
What is a raw device mapping (RDM), and when is it recommended that it be used?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
What is the maximum number of vCPUs supported by the fully licensed version of the vSphere hypervisor?
A) 8 vCPUs
B) 16 vCPUs
C) 64 vCPUs
D) 128 vCPUs
A) 8 vCPUs
B) 16 vCPUs
C) 64 vCPUs
D) 128 vCPUs
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
What type of virtual switch exists only within a single vSphere hypervisor?
A) standard
B) distributed
C) independent
D) isolated
A) standard
B) distributed
C) independent
D) isolated
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
What are some of the benefits of thin provisioning virtual disk files?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
What are the three different types of ports that exist on a virtual switch?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
What is the vmxnet3 virtual network adapter, and what features does it provide?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
What level of support does vSphere 6 provide for USB devices, and how can they be used with vSphere?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
What are the three options available when configuring a traffic shaping policy?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
What configuration file name would be assigned to the Raw Device Map (RDM) pointer file for a VM named Srv1?
A) Srv1.vmdk.rdm
B) Srv1.vswp
C) Srv1.rdm.vmdk
D) Srv1.rdm.vswp
A) Srv1.vmdk.rdm
B) Srv1.vswp
C) Srv1.rdm.vmdk
D) Srv1.rdm.vswp
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
When defining the network security policy, what security exceptions are you allowed to set, and what do they do?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
What are the three major virtual disk file types, and how do they differ?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
How many archive logs are maintained for a virtual machine at any one time?
A) two
B) four
C) six
D) eight
A) two
B) four
C) six
D) eight
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
What are virtual network switch policies?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
What statement regarding the use of distributed switches is accurate?
A) A distributed switch exists only within a single vSphere hypervisor, but is shared with multiple VMs.
B) A distributed switch is not compatible with the use of vMotion.
C) A distributed switch can be shared among multiple associated vSphere hosts, providing consistent network configuration.
D) A distributed switch can't make use of port groups.
A) A distributed switch exists only within a single vSphere hypervisor, but is shared with multiple VMs.
B) A distributed switch is not compatible with the use of vMotion.
C) A distributed switch can be shared among multiple associated vSphere hosts, providing consistent network configuration.
D) A distributed switch can't make use of port groups.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
A security policy has been applied to an individual port on a virtual switch. The switch itself has a conflicting policy configured. What setting has priority?
A) The settings at the virtual switch level will have priority, as the policy is inherited by the port.
B) The settings on the port will have priority, because the policy is overridden at the port level.
C) The overall setting will be disabled until the conflicting settings are manually changed.
D) The more restrictive setting will be used automatically.
A) The settings at the virtual switch level will have priority, as the policy is inherited by the port.
B) The settings on the port will have priority, because the policy is overridden at the port level.
C) The overall setting will be disabled until the conflicting settings are manually changed.
D) The more restrictive setting will be used automatically.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
Under what conditions might a virtual machine have a lock file?
A) A lock file can exist when a raw device mapping is utilized.
B) Lock files are used when a thin provisioned disk is configured.
C) Lock files are used when an IDE controller is configured for a virtual machine.
D) A lock file can exist when a virtual machine is stored on an NFS based data store.
A) A lock file can exist when a raw device mapping is utilized.
B) Lock files are used when a thin provisioned disk is configured.
C) Lock files are used when an IDE controller is configured for a virtual machine.
D) A lock file can exist when a virtual machine is stored on an NFS based data store.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
What virtual network adapter type should you use if you need to support fault tolerance as well as record/replay for network traffic?
A) vlance
B) e1000
C) vmxnet2
D) vmxnet3
A) vlance
B) e1000
C) vmxnet2
D) vmxnet3
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
While using vSphere for free, you are limited to how many virtual CPUs?
A) 1
B) 8
C) 32
D) 128
A) 1
B) 8
C) 32
D) 128
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
What is a NIC teaming policy, and what does it do?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck