CTI-110
Which of the following systems provide a free 30 day license, a free license, or a paid license for product?
ESXi via VMware
A DNS server takes a humanly readable address and translates it to an IP or IPv6, internet address.
True
A file 'extension' is the set of letters after a file name that tell the computer how to open that particular file.
True
A full clone can perform any application that the original VM can.
True
A good reason to virtualize your servers is to reduce cooling costs in the datacenter.
True
A server-level RAID controller would have its own CPU, CMOS, and RAM.
True
Another term for a type 1 hypervisor would be a bare metal hypervisor.
True
Containers are grouped into pods in a CMS.
True
Hardware servers are more robust machines than workstations and personal computers.
True
In a server environment, the operating system and major applications are kept on a RAID 1 volume.
True
Instead of having your company's own web server, it is usually easier and cheaper to have its pages hosted.
True
Microsoft Windows 10 is considered an open source operating system.
True
Operating systems based upon Linux are usually open source operating systems.
True
Repeaters are also called signal boosters.
True
SFTP is more secure than FTP.
True
The MAC OS X found on a MacBook would be considered a stand-alone operating system.
True
The VMware application of vMotion can be run through vCenter/vSphere to move VMs while they are still active.
True
The higher the version of ESXi, the more virtual hardware versions are supported.
True
VDI systems utilze thin clients.
True
VMware's vCenter is a virtual machine.
True
Windows HyperV would be an example of both a type 1 and 2 hypervisor.
True
Your Windows 10 must be running as a 64-bit system in order to run Hyper-v.
True
iSCSI can be accomplished over Ethernet frames.
True
Asymmetric key encryption requires how many keys?
Two
How many MAC OS X systems can be virtualized on an Apple iMAC?
Two
What two ways were shown to find out the hostname of a Windows PC?
Type hostname at the command prompt or using ipconfig /all.
Which description best describes MAC OS X?
UNIX
A URL always starts with a _____________
d. protocol
A automobile has an operating system that controls the fuel injection system, sparkplug firing, and the transmission system is considered to be a(n) ____________ operating system.
embedded
The Domain Name and hostname are the same for all computers.
fALSE
The vSphere system is normally accessed direclty by command line.
false
Which system has access directly to the CPU and its registers?
host OS
Which operating system must be put into place first?
host operating system
Most common workstation operating systems are of considered ______________.
network operating systems
Microsoft DOS is an example of a(n) ___________ operating system.
stand-alone
What type of encryption uses the same key for both encrypting and decrypting?
symmetric key encryption
The three most important tags that use attributes are links, lists, and ___________.
tables
A next generation firewall works on Layers 4-7 of the OSI Model, whereas regular firewalls only work on Layers 2 and 4 of the OSI Model.
true
An administrator of a cluster not only have full access to the cluster and hosts, but they can assign users to each host within the cluster.
true
Hypervisor programs are not required for running containers or container engines.
true
In the vSphere client, you can change the name of a VM.
true
It is the VPN firewall's task to decrypt data from remote clients to put on the corporate network and also to encrypt data going out to the corporate router, that is destined for the remote hosts.
true
vSphere can be used to manage multiple data centers in different locations.
true
What are the three things that you must define in order to set up vSphere actions?
who, what, and where
Which of the following is VMware's type 1 hypervisor of choice?
ESXi
What product from VMware is used to control multiple VMware type 1 hypervisors in a datacenter would be ___________.
ESXi
Disk striping requires a minimum of ___ disks.
2
As a minimum, RAID 5 requires ___ disk drives.
3
HyperV can only be installed on a system that is has ______________ architecture
64-bit
What is the current version of ESXi, vCenter, and/or vSphere?
7.2
iSCSI uses frames of ____ Bytes.
8KB
Match the connection type with the best description:
Adding additional data on existing phone lines. Very distance dependent. e. DSL Using coaxial antenna system to receive digital TV, music, VoIP, and data over the same system. (Defines broadband.) f. Cable System that uses a parabolic dish antenna to communicate with specific space objects that in turn, connect back to terrestrial systems. Usually has the highest latency. a. Satellite Legacy method of low bandwidth to connect to a provider c. Dialup Cellular technology that allows users to connect to the internet via their phone service b. 4G Using light frequencies through either plastic or glass as a conduit to connect. d. Fiber
When is the best time to install VMware Tools?
After installing the VM's OS
Fedora and CentOS both have Gnome ____________ built in as a type 2 hypervisor.
Boxes
What type of Virtual Network Adapter connects directly to the host network card's LAN?
Bridged
Match the appropriate product with its manufacturer or primary operating system.
Citrix f. Xen Orchestra Apple c. Parallels VMware d. ESXi Microsoft e. HyperV Fedora/CentOS b. GNOME Boxes Oracle a. Virtual Box
Which is an example of a container engine?
Docker
The RAM for a server-level RAID controller is of what type?
ECC
Which protocol is used in the SAN to communicate at high speed and is usually proprietary?
FC
A container registry is listed in a repository.
False
A normal laptop would usually possess a RAID 5 setup.
False
CIFS is the replacement for FCoE.
False
Data volumes for a server, would usually be set up with SCSI HDDs in a RAID 0 configuration.
False
Encrypted documents can be read by any key.
False
Encryption is simply encoding messages that anyone can read.
False
HyperV is an Oracle-Sun Microsystems product.
False
One disadvantage of RAID 0 is the loss of 50% of the total storage area.
False
One disadvantage of servers being virtualized is that a virtualized server pulls more current and electricity than a regular server.
False
ProxMox is a type 2 hypervisor.
False
TLS is used on Layer 7 of the OSI Model.
False
The term for servers that verify security certificates found on servers is a TLS server.
False
VMs can be deleted from inventory while they are powered on.
False
VMware Fusion is made to be installed on a Windows 10 computer.
False
VMware Fusion would perform the best on a Windows 10 x64 bit host system.
False
VMware's vSphere is a virtual machine running ESXi as an application.
False
Virtual hardware can only be changed or edited prior to the OS being installed.
False
____ is a file exchaning protocol developed for UNIX/Linux.
File Transfer Protocol*
What device protects a private network from unwanted incoming traffic?
Firewall
In which type of system would you most likely find a RAID 0 system?
Graphics Rendering System
Match the following systems with their descriptions:
Microsoft's implemention of containers a. Hyper-V Containers Large container engine meant to run a datacenter. d. Kubernettes Linux container engine that runs on top of Ubuntu as its OS e. LXC Container engine known for security and runs mainly on the command line b. Podman Largest of the container engines that is meant to be run on a single server. Uses containerd and promoted by Linux community c. Docker Not a container engine but a Type I Hypervisor f. ESXi
What program can be installed on MAC OS X as a downloadable type 2 hypervisor?
Parallels
Which form of RAID maximizes the read and write speed of hard drives?
RAID 0
SMB is used by Windows and Linux systems for WAN connections.
SMB is meant for LAN connections.
Which type of drives are not recommended for NAS/SAN deployment?
SSD
Which of the following would be a closed-source, licensed, operating system?
Solaris
A user can change their password by accessing which menu in vSphere's GUI?
User Options
What tool provides information on which Windows operating systems are able to work with specific versions of the ESXi host?
VMware Compatibility Guide
Which product can not perform snapshots?
VMware Fusion Player
Which application is produced by Oracle as a type 2 hypervisor?
Virtual Box
Microsoft had a product to allow the virtualization of its servers on Windows clients. The discontinued product, ______________ was a type 2 hypervisor for Microsoft servers that allowed them to be run on Windows clients
Virtual Server
__________ allows for live virtual machines to be moved between active ESXi servers.
Vmotion
RAID 0 is referred to as ________ __________.
b. Disk Striping
What does RAID 0 maximize?
b. Read & Write speeds
When do VPN clients encrypt their data to send to a corporate network?
before sending over the internet
Another term for the creation of a complete copy of a VM is referred to as a(n)
clone