2018 Virtualization Midterm (w/multiple choice)
Where in the Hyper-V Settings window for a virtual machine can you configure the ability of the virtual machine to access local resources on the host computer, such as audio, printers, and USB devices?
Enhanced Session Mode Policy
What are the two different types of Storage Area Network system?
Fibre Channel and iSCSI
You are installing VirtualBox on a computer. What is the minimum amount of RAM required to perform the install? a. 512 MB b. 1024 MB c. 4096 MB d. 8192 MB
a. 512 MB
When using the Hyper-V hypervisor, what is the default mouse release key combination that will transfer mouse control from the VM back to the host? a. Ctrl + Alt + left arrow b. Ctrl + Home c. Ctrl + Alt + Insert d. Ctrl + Enter
a. Ctrl + Alt + left arrow
Under what menu within VirtualBox can a virtual appliance be exported? a. File Menu b. Machine Menu. c. Settings Menu d. Preferences Menu
a. File Menu
You are employed by a cloud service provider that offers virtual machine services along with virtual switches, storage, firewalls, and other virtual devices. What type of cloud environment does your employer sell? a. Infrastructure as a Service b. Platform as a Service c. Software as a Service d. Core as a Service
a. Infrastructure as a Service
What is the purpose of a shadow page table when a hypervisor is used? a. It tracks the memory pages allocated by each guest VM. b. It tracks the hard disk page file usage by each guest VM. c. It tracks the amount of I/O utilized by each guest VM. d. It tracks the CPU paging performance of each guest VM.
a. It tracks the memory pages allocated by each guest VM.
You are using a network attached storage (NAS) system for virtual machine storage. What protocol can you use with VMware ESXi to access the files on the NAS? a. NFSv3 b. AFP c. CIFS d. SMB
a. NFSv3
The VDI disk file format is native to what virtualization platform? a. Oracle VirtualBox b. VMware c. Microsoft Virtual PC d. Microsoft Hyper-V
a. Oracle VirtualBox
What type of cloud computing service provides hardware infrastructure along with necessary operating system software for running client applications? a. Platform as a Service b. Software as a Service c. Infrastructure as a Service d. Hardware as a Service
a. Platform as a Service (PaaS)
While using VirtualBox in full screen mode, what key press combination will display the main menu bar? a. Right Ctrl + Home b. Right Ctrl + F c. Left Ctrl + Break d. Left Ctrl + Insert
a. Right Ctrl + Home
What VMware vSphere technology allows you to move not only a running virtual machine to a different vSphere host, but also the files associated with the virtual machines to a different data store? a. Storage vMotion b. VMware DRS c. vMotion d. VMware FT
a. Storage vMotion
What happens when the "Delete" link is used from the Actions menu in Hyper-V Manager? a. The virtual machine configuration files are removed, but the virtual disk files are left in place. b. The virtual machine configuration files and virtual hard disks are deleted. c. The virtual machine configuration files are retained, but the virtual disk files are deleted. d. The virtual machine is removed from the list in Hyper-V manager, but both the configuration files and disk files remain intact.
a. The virtual machine configuration files are removed, but the virtual disk files are left in place.
When a virtual machine in Hyper-V is saved from the Action menu, where is the virtual machine's memory and state information saved to? a. They're both saved to a file on the host computer b. They're both saved to the virtual machine's configuration file. c. They're both saved to the virtual machine's virtual hard disk file. d. They're both saved to the guest OS's page file, much like a traditional suspend operation.
a. They're both saved to a file on the host computer
A user has asked for your assistance in restoring the wizard windows and confirmation messages that they've checked the "Do not show this again" option. Where can this setting be found? a. Under the Hyper-V Settings dialog box, within the "User" section. b. Under the Actions menu, "Reset Check Boxes" option. c. Under the virtual machine settings window, in the "Management" section. d. Under the Hyper-V Settings dialog box, within the "Server" section.
a. Under the Hyper-V Settings dialog box, within the "User" section.
You are planning to install a Windows 7 guest operating system on a virtual hard disk using VMware Workstation 12 Pro, and you intend to use a partition that is 3 TB in size. What should you do to ensure that the partition is bootable? a. Use a UEFI firmware type. b. Use a dynamic virtual disk. c. Enable large drive support in the BIOS screen. d. Enable "LBA mode" in the drive controller window.
a. Use a UEFI firmware type.
What is NOT a product designed specifically for the virtualization of applications within a VDI environment? a. VMware Fusion b. Microsoft App-V c. Altiris Software Virtualization Solution d. VMware ThinApp
a. VMware Fusion
What is a valid product that the "Connect to Server" option in the File Menu for VMware Workstation 12 Pro will function with? a. VMware vSphere b. VMware Fusion c. VMware vCloud Air d. VirtualBox
a. VMware vSphere
What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases? a. exploitation phase b. scanning phase c. reconnaissance phase d. pivoting phase
a. exploitation phase
You are getting ready to deploy a virtual machine on a Hyper-V host, and have come to the "Specify Generation" window. What generation should you select if your virtual machine will have a 32-bit guest OS? a. generation one b. Neither generations will support a 32-bit operating system. c. generation two d. Both generations will support a 32-bit operating system.
a. generation one
What is the most commonly used form of a Storage Area Network? a. An iSCSI network b. A Network Attached Storage device c. A network shared folder d. A shared, mounted Virtual Hard Disk file
a. iSCSI network
When using the Hyper-V hypervisor, what virtual switch type is the most restrictive, in that it will not allow communication with even the host? a. private network b. internal network c. isolated network d. external network
a. private network
What file extension is used by a VirtualBox Machine Definition file? a. .vmng b. .vbox c. .vcfg d. .virt
b. .vbox
What private IP address range is a Class B private IP range? a. 192.168.1.0 to 192.168.254.0 b. 172.16.0.0 to 172.31.0.0 c. 224.0.0.0 to 254.0.0.0 d. 10.0.0.0 to 10.255.255.0
b. 172.16.0.0 to 172.31.0.0
What statement regarding the use of a generation two virtual machine is accurate? a. A generation two virtual machine will not support a SCSI based DVD drive. b. A generation two virtual machine simulates the newer style EFI firmware. c. Generation two virtual machines support the use of legacy network adapters. d. A generation two virtual machine does not support the addition of an IDE controller.
b. A generation two virtual machine simulates the newer style EFI firmware.
You are about to install a guest OS from a DVD disc. What must you do in order to install the guest OS in a generation two virtual machine? a. Nothing, the default configuration for a second generation virtual machine is to use the physical DVD drive as the source for installation. b. An ISO file must be created from the DVD in order to use it with a generation two virtual machine. c. An IDE controller must be added to the virtual machine, and a DVD player attached to it. d. Map the host's DVD drive to a DVD drive in the virtual machine.
b. An ISO file must be created from the DVD in order to use it with a generation two virtual machine.
What DRS mode has the ability to move VMs to other ESXi hosts based on a preset performance threshold rating, requiring no actions on behalf of an ESXi administrator? a. Preset b. Automatic c. Semi-automatic d. Manual
b. Automatic
What feature, available in Windows 7 and Windows Server 2008 and later allows the guest OS to communicate directly with a hypervisor, for increased features and improved performance? a. Second Level Address Translation (SLAT) b. Enlightened I/O c. Non-Uniform Memory Access (NUMA) d. Transparent Page Sharing
b. Enlightened I/O
What statement regarding the use of Hyper-V is accurate? a. Hyper-V includes native support for USB devices. b. Hyper-V requires a 64-bit processor with hardware virtualization support. c. Hyper-V can only be used to host Microsoft based virtual machines. d. Hyper-V does not include support for PATA based disk systems.
b. Hyper-V requires a 64-bit processor with hardware virtualization support.
A VM for Windows 8 has been created within VirtualBox. What will be the default virtual network adapter type for this VM? a. PCNet FAST III b. Intel Pro/1000 MT Desktop c. Broadcom Generic d. Realtek Gigabit NIC
b. Intel PRO/1000 MT Desktop
When a Xen based guest VM makes a request for a hardware resource, such as reading from a disk, where is the request sent to? a. It is sent directly to the hardware on the host machine. b. It is sent to the Domain 0 guest. c. It is sent to the host operating system, which then handles the request. d. It is queued into the guest VM's I/O page table.
b. It is sent to the Domain 0 guest.
What does the "ACPI Shutdown" option from the Machine menu do? a. It suspends the virtual machine using the ACPI shutdown command. b. It performs a safe and proper shutdown of the VM. c. It forces the VM to immediately power off. d. It creates a saved state for the VM and then powers it off.
b. It performs a safe and proper shutdown of the VM.
What option is a valid choice when choosing the adapter type for a SCSI adapter within VMware Workstation 12 Pro? a. Parallel Logic b. LSI logic c. ATAPI d. ATA Logic
b. LSI logic
Where can the option to enable Unity mode be found? a. File menu b. Menu tool bar c. View menu d. Edit menu
b. Menu tool bar
What virtualization product supports the use of 4-KB disk sectors within virtual drives, allowing the virtual machine to take advantage of increased storage capacity? a. XenWorks b. Microsoft Hyper-V c. Oracle VirtualBox d. VMware vSphere
b. Microsoft Hyper-V
You have finished configuring the Remote Display extension for VirtualBox, and must instruct a user on how to connect to the host. What protocol must the user utilize to communicate using this extension? a. VNC b. RDP c. RAW d. RMP
b. RDP
What virtualization technology makes it possible to avoid overhead associated with software-managed shadow page tables? a. Time Sliced Prioritization Method (TSPM) b. Second Level Address Translation (SLAT) c. Threaded Input / Output Translation (TIOT) d. Virtual Disk Interface Layer (VDIL)
b. Second Level Address Translation
How is the iSCSI connection process typically made secure? a. The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled. b. The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key. c. The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption. d. The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.
b. The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
What SCSI adapter type should you use for performance reasons? a. The ATAPI type, because it uses a parallel bus. b. The LSI Logic SAS type, because it uses a serial interface. c. The LSI Logic type, because it uses a parallel interface. d. The Bus Logic type, because it provides a larger buffer.
b. The LSI Logic SAS type, because it uses a serial interface.
After copying a virtual machine, you discover that neither the copy or the original virtual machine can reliably communicate with the network using a bridged network connection. What is most likely the issue? a. Both virtual machines have been assigned the same IP address on the network. b. The copied virtual machine has the same MAC address as the original VM. c. The copied virtual machine is using the wrong network adapter type. d. The original VM's configuration file was corrupt before making the copy attempt.
b. The copied virtual machine has the same MAC address as the original VM.
What is the purpose of the NX/XD CPU feature present in most modern Intel and AMD processors? a. The feature enables the use of virtualization on the CPU. b. The feature adds a layer of security by marking areas of memory as non-executable. c. The feature allows for the use of virtual peripheral devices. d. The feature increases the efficiency of RAM when used with virtual machines.
b. The feature adds a layer of security by marking areas of memory as non-executable.
What is not a valid requirement for the installation of VirtualBox? a. The host must have a recent Intel or AMD x86 CPU b. The host must support hardware virtualization. c. The host must have at least 512 MB of RAM. d. The host must have at least 30 MB disk space
b. The host must support hardware virtualization.
Where should you check to ensure that both the DEP/NX bit and hardware virtualization are enabled for your host machine running Windows Server 2016 Standard? a. The Microsoft Management Console. b. The system BIOS configuration screens. c. Under Control Panel, in the System application. d. Device Manager, under CPU
b. The system BIOS configuration screens.
Where can the settings for the Shielding option on a virtual machine be configured? a. Under the Hyper-V Settings window for a host, in the User section. b. Under the Settings window for the virtual machine, in the Hardware section. c. Under the Settings window for the virtual machine, in the Management section. d. Under the Hyper-V Settings window for a host, in the Server section.
b. Under the Settings window for the virtual machine, in the Hardware section.
What VMware Workstation 12 Pro feature allows a host to separate applications from a virtual machine so that they can be run without the VMware interface? a. vApp mode b. Unity mode c. Fusion mode d. VM Share mode
b. Unity mode
While using VMware Workstation 12 Pro, you notice that virtual machine performance is starting to slow. Upon further investigation, you discover that the virtual machines are causing paging on the host, despite plenty of RAM being available. What should you do to improve performance? a. Disable the page file in the guest OS. b. Use the "Fit all virtual machine memory into reserved host RAM" option. c. Disable the host's page file. d. Increase the amount of RAM available to the guest VM.
b. Use the "Fit all virtual machine memory into reserved host RAM" option.
What advanced virtual hard disk format, introduced by Windows Server 2012 R2, provides increased storage capacity of up to 64 TB per VM disk, improved performance, and security? a. VMDK b. VHDX c. VDI d. VHD
b. VHDX
What component serves as the core of the vSphere ESXi hypervisor? a. vOS embedded b. VMKernel c. vSphere Core d. vMotion AOS
b. VMKernel
What two virtual network switches in VMware Workstation 12 Pro provide communication with virtual machines without using the physical network? a. VMnet2 and VMnet3 b. VMnet1 and VMnet8 c. VMnet7 and VMnet8 d. VMnet0 and VMnet1
b. VMnet1 and VMnet8
When using VMware Workstation 12 Pro Tools in a VM, the host machine's printers are added to the virtual machine. How is this accomplished? a. VMware Tools adds the printers using the drivers installed on the host, and installs them in the guest as well. b. VMware tools creates a virtual serial port to attach the printers. c. VMware Tools adds the printers using virtual network adapters, making the printers appear to be network printers. d. VMware Tools uses a named spooling file in the host to pass data
b. VMware tools creates a virtual serial port to attach the printers.
What VMware technology is used by VMware FT to keep the secondary virtual machine up to date with the active primary virtual machine? a. VMware vMotion b. VMware vLockstep c. VMware vSync d. VMware VMFS
b. VMware vLockstep
What Windows OS is not supported by Microsoft for installation within Hyper-V? a. Windows Server 2008 R2 b. Windows 7 Home Edition c. Windows Home Server 2011 d. Windows Vista Professional Edition SP2
b. Windows 7 Home Edition
When utilizing UEFI in VMware, what is the oldest version of Windows that can be installed? a. Windows XP b. Windows 8 c. Windows 7 d. Windows Vista
b. Windows 8
What is the oldest version of Windows Server to support the use of Microsoft's Hyper-V product? a. Windows Server 2003 b. Windows Server 2008 c. Windows Server 2012 d. Windows Server 2016
b. Windows Server 2008
While modifying a disk image within VirtualBox, what mode causes the state of the disk image to not be saved when a snapshot is created, and not restored when a snapshot is reverted back? a. Normal mode b. Writethrough mode c. Shareable mode d. Immutable mode
b. Writethrough mode
What statement regarding the installation requirements for Hyper-V is accurate? a. To install Hyper-V, you need a 32-bit or 64-bit version of Windows Server 2016. b. You must have a processor that supports SLAT in order to install Hyper-V. c. Hyper-V does not require the use of a processor with hardware virtualization. d. Hyper-V will not run on a processor with the DEP/NX bit feature.
b. You must have a processor that supports SLAT in order to install Hyper-V.
You have been tasked with creating a virtual machine that will be providing hosted services on the physical network, and possibly the Internet. What network mode should be used? a. local mode b. bridged mode c. shared mode d. host only mode
b. bridged mode
When using Microsoft Hyper-V, what type of virtual switch should you utilize if you want to limit communication of a virtual machine to only virtual machines running on the host? a. internal virtual switch b. private virtual switch c. local virtual switch d. external virtual switch
b. private virtual switch
What is the maximum number of virtual hard disks that can be supported on the SATA controller within VirtualBox? a. 8 b. 16 c. 30 d. 60
c. 30
What statement regarding virtual disk types is accurate? a. A fixed size virtual disk does not immediately allocate the configured size of the disk. b. A fixed size virtual disk has reduced performance in comparison to a dynamic disk. c. A dynamic disk does not immediately allocate the configured size of the disk. d. A dynamic disk is only suitable for hosts with large amounts of storage to accommodate their size.
c. A dynamic disk does not immediately allocate the configured size of the disk.
Under what menu in the Virtual Machine Connection window can you send a "Ctrl+Alt+Delete" sequence to the guest OS? a. View b. File c. Action d. Edit
c. Action
What statement regarding the use of an IDS is not accurate? a. An IDS can detect a virtual machine that is infected by a worm. b. An IDS can detect a denial of service attack. c. An IDS improves performance of a virtual network. d. An IDS examines all packets on a virtual network.
c. An IDS improves performance of a virtual network.
On a Windows 10 host, where is the default storage location for virtual machines when using VMware Workstation 12 Pro? a. C:\Virtual Machines b. C:\Users\username\Virtual Machines c. C:\Users\username\Documents\Virtual Machines d. C:\Program Files\VMware\Virtual Machines
c. C:\Users\username\Documents\Virtual Machines
When settings are changed in the BIOS user interface, where are they stored? a. RAM b. L3 cache c. CMOS d. hard drive
c. CMOS
What key combination in VMware Workstation 12 Pro will bring up the Snapshot Manager? a. Ctrl + S b. Ctrl + Alt + K c. Ctrl + M d. Alt + Enter
c. Ctrl + M
You are attempting to install a Windows Server 2008 guest OS to a SCSI based drive within a generation one virtual machine, however, you find you are unable to perform the install. What is the reason for this failure? a. Windows Server 2008 does not support the virtual SCSI controller used by generation one VMs in Hyper-V. b. A SCSI based drive can't be added to a generation one virtual machine. c. Generation one virtual machines do not support a non-IDE based boot drive. d. The BIOS of a generation one virtual machine will not recognize the SCSI controller.
c. Generation one virtual machines do not support a non-IDE based boot drive.
You have enabled the "Data Exchange" feature within Integration Services for Hyper-V. What registry key is used to pass information back and forth between the guest and the host? a. HKEY_USERS\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters b. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters c. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters d. HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
c. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters
An ISO image file uses what format to store a disc's contents in a single file on a computer? a. Binary format (BIN) b. Disc encoded structure format c. ISO 9660 d. ISO 1040
c. ISO 9660
You have restored a snapshot on a VMware Workstation 12 Pro based virtual machine, only to discover that after reverting, an independent disk has not been reverted. What is the issue? a. The disk is connected to another virtual machine that was not included in the snapshot. b. The disk is set to persistent mode, causing the data to persist across snapshots. c. Independent disks are not included in snapshots. d. The disk is set to non-persistent mode, so the data stored on it is lost when the VM is powered down.
c. Independent disks are not included in snapshots.
What does the AutoProtect feature do within VMware Workstation Pro 12? a. It prevents a virtual machine from being deleted from the host. b. It protects a virtual machine's configuration files from modification. c. It automatically takes snapshots at a given interval to enable quick recovery. d. It enables virtual machine security protections when the VM is connected to a network.
c. It automatically takes snapshots at a given interval to enable quick recovery.
When working with the toolbar for VirtualBox, what does the "Discard" setting do? a. It discards the entire virtual machine, removing it from the host. b. It discards the current virtual machine running state, turning the virtual machine off. c. It discards the saved state of the virtual machine and start the virtual machine fresh. d. It discards the contents of the virtual machine's memory.
c. It discards the saved state of the virtual machine and starts the virtual machine fresh.
Which of the following does an operating system installed in a guest virtual machine do? a. interacts directly with host machine hardware b. controls the hypervisor c. interacts with hardware through the hypervisor d. intercepts requests for an emulated hard drive
c. It interacts with hardware through the hypervisor
What does the Ctrl + Alt + Break key combination do within Hyper-V? a. It performs a paste operation. b. It releases the host mouse and keyboard from the VM's management screen. c. It toggles the use of the Full Screen Mode. d. It pauses the currently selected running virtual machine.
c. It toggles the use of the Full Screen Mode.
Under what menu within VirtualBox can the "Discard Saved State" be found? a. File menu b. Preferences Menu c. Machine menu d. Settings menu
c. Machine menu
A virtual machine is being migrated to VirtualBox, and you are examining the requirements for the virtual machine. One requirement in particular is that the virtual machine must be able to use up to seven serial ports. Will the migration be successful? a. Yes, VirtualBox supports an unlimited number of serial ports within a VM. b. Yes, VirtualBox can use duplexing to serve a maximum of 16 serial ports. c. No, VirtualBox can only support 4 serial ports max. d. No, VirtualBox does not support the use of serial ports within a VM.
c. No, VirtualBox can only support 4 serial ports max.
You are attempting to move a vSphere virtual machine stored in a VMFS formatted iSCSI volume to a workstation running VMware Workstation 12 Pro. What must be done to the VM before it can be moved? a. The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application. b. The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location. c. Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved. d. The virtual disk must be converted to a .vmdk file prior to it being moved from the volume.
c. Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved.
What format enables a virtual machine to be moved between virtualization platforms, and is often used for deploying virtual appliances? a. Virtual Machine Disk (VMDK) b. Virtual Disk Image (VDI) c. Open Virtualization Format (OVF) d. Shared Virtualization System (SVS)
c. Open Virtualization Format (OVF)
When using a physical graphics card to accelerate video and 3D rendering in a virtual machine, what role must be added to the server? a. 3D Render Host role b. Terminal Services role c. Remote Desktop Virtualization role d. Virtualized Desktop Infrastructure role
c. Remote Desktop Virtualization role
What keyboard shortcut can be used to send a Ctrl + Alt + Delete sequence to a virtual machine in VirtualBox? a. Ctrl + Alt + Insert b. Right Ctrl + Alt + Break c. Right Ctrl + Del d. Right Ctrl + Break
c. Right Ctrl + Del
You are storing a virtual disk on a partition that is FAT32 formatted. What option in VMware Workstation 12 Pro should you select to avoid the limitations of FAT32? a. Do not use advanced permissions on disk files b. Allocate all disk space now c. Split virtual disk into multiple files d. Store virtual disk as a single file
c. Split virtual disk into multiple files
What are the two different types of checkpoints? a. Production and standby b. Primary and secondary c. Standard and production d. Supplemental and tertiary
c. Standard and production
What component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each guest available for other virtual machines or the host computer? a. The guest operating system b. The host operating system c. The hypervisor d. The BIOS
c. The hypervisor
What statement regarding the use of iSCSI networks is not accurate? a. LUNs are connected to a TCP/IP network using one or more Storage Processors. b. Each target must have an iSCSI qualified Name (IQN) or Extended Unique Identifier. c. The iSCSI target is a single physical disk that is assigned a LUN. d. Entities on an iSCSI network are referred to as nodes.
c. The iSCSI target is a single physical disk that is assigned a LUN.
You have just configured a virtual machine using default options where possible and turned it on for the first time. You discover the IP address of the guest is outside the IP address range of your physical network, but is still able to communicate with the Internet. What is the explanation for the difference in IP address? a. The network adapter for the virtual machine is utilizing the VMnet1 virtual switch. b. The network adapter for the virtual machine is using the host-only switch. c. The network adapter for the virtual machine is using the default NAT switch option. d. The network adapter for the virtual machine is operating in bridged mode, by default.
c. The network adapter for the virtual machine is using the default NAT switch option.
You are working in a VMware vSphere based environment, and have been asked to create a parent virtual machine that can be shared amongst many users. One of the requirements of this desired setup is that individual user changes must be kept separate. What is the best implementation based on the requirements given? a. The parent virtual machine should be cloned once for each user that will require access. b. The parent virtual machine should be configured to allow user-specific snapshots. c. The parent virtual machine should be configured to make use of linked clones. d. The parent virtual machine should be configured with shared folders that are uniquely named per each user.
c. The parent virtual machine should be configured to make use of linked clones.
What is used to facilitate the use of virtual machine dynamic memory? a. The virtualization features of the processor are used to overload and compress the amount of physical RAM needed for the dynamic memory. b. The virtual hard disk associated with the virtual machine. c. The smart paging file, which is normally located in the same directory as the virtual machine configuration files. d. A registry entry that enables sharing the host's page file with all guest machines.
c. The smart paging file, which is normally located in the same directory as the virtual machine configuration files.
You have just turned on a virtual machine and after determining that a network issue exists, you discover that the virtual machine is using the IP address of 169.254.141.259, with a subnet mask of 255.255.0.0, and no default gateway has been set. What is the issue? a. The virtual machine is using an IP address in the loopback address range. b. The default gateway should be configured to 169.254.1.1 in order to access the network. c. The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address. d. The virtual machine is using the wrong subnet mask for the class of IP address configured.
c. The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address.
You are trying to provision a virtual machine within VirtualBox to allow for remote access over the network, and wish to configure authentication for the remote display extension. Where do you find these settings? a. They are found within the Network section under Preferences for the VM. b. They are found within the Display section under Preferences for the VM. c. They are found within the General section under Preferences for the VM. d. The settings for authentication are found within the File Menu, under "Remote Access Config".
c. They are found within the General section under Preferences for the VM.
Your work environment consists of a large number of Mac OS X based devices. The developers in your network have requested virtualization software be installed for their use. What product should you use? a. VMware Workstation b. Hyper-V c. VMware Fusion d. Xen
c. VMware Fusion
What hypervisor does NOT include a DHCP service for use with virtual machines? a. VMware Fusion b. VMware Workstation c. VMware vSphere d. VirtualBox
c. VMware vSphere
What configuration setting determines the maximum screen resolution and number of colors for a VM? a. RAM b. PAE/NX c. Video RAM (VRAM) d. PRAM
c. Video RAM (VRAM)
What version of Windows Server 2016 does not include the Hyper-V role? a. Windows Server 2016 Datacenter b. Windows Server 2016 Web c. Windows Server 2016 Essentials d. Windows Server 2016 Standard
c. Windows Server 2016 Essentials
What sort of network policy should you utilize in vSphere if your intent is to limit the amount of bandwidth a virtual machine is allowed to use? a. network NIC teaming policy b. network flow policy c. network traffic shaping policy d. network security policy
c. network traffic shaping policy
What type of malware is a virus that operates at the same privilege as the hypervisor and utilizes various methods to hide from detection? a. worm b. adware c. rootkit d. trojan
c. rootkit
You have been tasked with creating a virtual machine that will require access to the Internet, but should be prevented from sending and receiving packets directly from the physical network. What network mode should be used? a. local mode b. bridged mode c. shared (NAT) mode d. host only mode
c. shared (NAT) mode
Why are type-1 hypervisors more efficient than type-2 hypervisors? a. A type-1 hypervisor is able to overcommit RAM availability to VM guests. b. A type-1 hypervisor is capable of running a greater variety of operating systems. c. A type-1 hypervisor uses an abstraction layer in the host OS to access hardware. d. A type-1 hypervisor accesses the physical hardware directly.
d. A type-1 hypervisor accesses the physical hardware directly
You are configuring a backup program for a server that hosts Hyper-V based virtual machines. One of your required locations to back up is the folder containing the virtual machine configuration files. Where are these located? a. C:\Users\Public\Documents\Windows\Hyper-V b. C:\Users\Public\Documents\Hyper-V c. C:\Users\Public\AppData\Microsoft\Windows\Hyper-V d. C:\ProgramData\Microsoft\Windows\Hyper-V
d. C:\ProgramData\Microsoft\Windows\Hyper-V
What statement regarding the use of linked clones within VMware Workstation 12 Pro is not accurate? a. A linked clone shares the base virtual machine files with the parent or snapshot. b. A linked clone takes up less disk space than a full clone. c. Multiple linked clones can be based on a single parent. d. Changes made to each of the linked clones are stored within the template VM's virtual disk files.
d. Changes made to each of the linked clones are stored within the template VM's virtual disk files.
How do virtual COM ports communicate with the host machine on Hyper-V? a. COM ports communicate via special TCP/IP enabled network adapters on the guest and the host. b. The serial ports must utilize a special Microsoft USB driver that passes the traffic on the host's USB bus. c. Communication occurs through a setting in the Windows registry. d. Communication is done through the use of a named pipe.
d. Communication is done through the use of a named pipe.
When in the Virtual Machine Hardware Compatibility window of VMware Workstation 12 Pro, what checkbox should be selected to provide compatibility for migration of the virtual machine to the vSphere Hypervisor? a. Hyper-V Server compatibility b. Oracle compatibility c. XenWorks compatibility d. ESX Server compatibility
d. ESX Server compatibility
You are attempting to change the boot device of a virtual machine. What key can be pressed during the VM BIOS screen to change the boot device? a. Delete b. F2 c. Esc d. F12
d. F12
What is the maximum number of network adapters that can be configured for a virtual machine running in VirtualBox? a. one b. two c. three d. four
d. Four
Where can you manually connect a USB device to a virtual machine on VMware Workstation 12 Pro? a. The device can be added via the "Manage VM" screen. b. From the Preferences menu, select "Attach USB device", select the desired device. c. In the virtual machine's settings, under the USB controller, click "Add" to add the device. d. From the VM menu, select Removable Devices, then attach the USB device.
d. From the VM menu, select Removable Devices, then attach the USB device.
While modifying a disk image within VirtualBox, what mode causes any changes made to the disk image to be lost when the VM is powered down? a. Normal mode b. Writethroug mode c. Shareable mode d. Immutable mode
d. Immutable mode
While modifying a disk image within VirtualBox, what mode allows for multiple virtual machines to share a single disk image at the same time, as well as store the changes unique to each VM? a. Normal mode b. Writethrough mode c. Shareable mode d. Multi-attach mode
d. Multi-attach mode
What key serves as the key that releases control of a host's keyboard and mouse from a guest virtual machine's control when using VirtualBox? a. Left Alt b. Break c. Delete d. Right Ctrl
d. Right Ctrl
What statement regarding the use of IPv4 is accurate? a. The subnet mask is used to determine what networks are public and what networks are private. b. IPv4 utilizes a 128-bit address to communicate on the network. c. IPv4 utilizes a 48-bit address to communicate on the network. d. The 127.0.0.1 address is reserved as a loopback address.
d. The 127.0.0.1 address is reserved as a loopback address.
Under what conditions can you dynamically change the number of vCPUs or memory available to a guest OS? a. The host's hardware must support hot add features via VT-x. b. The host must be using a type-2 hypervisor. c. The guest OS must be installed in a UEFI enabled VM. d. The guest OS must support the dynamic addition of CPUs and memory.
d. The guest OS must support the dynamic addition of CPUs and memory.
What statement reflects a valid approach to improving performance and security on a virtual server that accesses shared storage over the network, in addition to providing networking services? a. The host should be placed in a special VLAN along with the storage to isolate access. b. The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services. c. The host should be configured to use the same virtual network switch for both accessing shared storage and providing services. d. The host should be configured to use separate network adapters for accessing storage and providing services.
d. The host should be configured to use separate network adapters for accessing storage and providing services.
While using a linked clone, what option should be enabled to ensure the parent or snapshot is not deleted or changed? a. The AutoProtect option should be enabled. b. The VDI mode should be enabled on the linked clone. c. The non-persistent mode should be enabled on the independent disk associated with the clone. d. The template option should be enabled on the parent.
d. The template option should be enabled on the parent
You are actively using a virtual machine on your host computer, and have noticed that the virtual machine is connecting each USB device you connect to your system automatically. What must be done in order to change this setting? a. A device attachment rule must be created to prevent the addition of new devices automatically. b. The USB controller for the virtual machine must be removed, and a new one added. c. The virtual machine must be powered on, and the "Automatically connect new USB devices" option must be turned off. d. The virtual machine must be powered off, and the "Automatically connect new USB devices" option must be turned off.
d. The virtual machine must be powered off, and the "Automatically connect new USB devices" option must be turned off.
When using the VMware Horizon software, where do client desktop operating systems run? a. They run on a host running VMware Workstation Pro. b. They run on a Windows Server 2012 or later host using Hyper-V c. They run on a Citrix XenServer. d. They run on a VMware vSphere ESXi host.
d. They run on a VMware vSphere ESXi host.
What virtual network switch in VMware Workstation 12 Pro is used for bridged communications with the physical network? a. VMnet5 b. VMnet1 c. VMnet8 d. VMnet0
d. VMnet0
What virtual switch, created by default with VMware Workstation 12 Pro, is used to connect a virtual machine to the host computer via NAT? a. VMnet0 b. VMnet5 c. VMnet1 d. VMnet8
d. VMnet8
What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline? a. VMware vMotion b. VMware vCluster c. VMware AlwaysOn d. VMware FT
d. VMware FT
A production type checkpoint within Hyper-V utilizes what service in the guest OS to perform the checkpoint? a. Integration Services Checkpoint for Windows b. Background Intelligent Transfer Service c. Windows Backup Service d. Volume Shadow Copy Service
d. Volume Shadow Copy Service
What hypervisor uses a special guest called Domain 0 that loads along with the hypervisor and is used to directly access the hardware? a. VMWare ESXi b. VMWare Workstation c. Oracle VirtualBox d. Xen
d. Xen
The process of storing a single copy of a data sector and then using reference pointers to access this data from other locations is known by what term? a. sector overloading b. storage tiering c. hard linking d. data deduplication
d. data deduplication
What is the default disk type utilized by the Hyper-V hypervisor? a. differencing disk b. independent disk c. fixed disk d. dynamic disk
d. dynamic disk
You are configuring an IDE controller within VirtualBox. How many drives are you allowed to add to the controller? a. one b. two c. three d. four
d. four
What feature, supported by VMWare, allows the live migration of a running VM from one host to another? a. vMigration b. vTarget c. vMove d. vMotion
d. vMotion
What does the PAE/NX option do when it is enabled? a. It prevents a virtual machine guest from accessing the memory of another gues. b. It allows for the use of virtual disks larger than 2 TB in size c. It enables the ability for virtual network cards to reach 1 gbps throughput d. It enables 32-bit operating systems to access more than 4 GB of RAM
d.It enables 32-bit operating systems to access more than 4 GB of RAM.