CTI-110

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following systems provide a free 30 day license, a free license, or a paid license for product?

ESXi via VMware

A DNS server takes a humanly readable address and translates it to an IP or IPv6, internet address.

True

A file 'extension' is the set of letters after a file name that tell the computer how to open that particular file.

True

A full clone can perform any application that the original VM can.

True

A good reason to virtualize your servers is to reduce cooling costs in the datacenter.

True

A server-level RAID controller would have its own CPU, CMOS, and RAM.

True

Another term for a type 1 hypervisor would be a bare metal hypervisor.

True

Containers are grouped into pods in a CMS.

True

Hardware servers are more robust machines than workstations and personal computers.

True

In a server environment, the operating system and major applications are kept on a RAID 1 volume.

True

Instead of having your company's own web server, it is usually easier and cheaper to have its pages hosted.

True

Microsoft Windows 10 is considered an open source operating system.

True

Operating systems based upon Linux are usually open source operating systems.

True

Repeaters are also called signal boosters.

True

SFTP is more secure than FTP.

True

The MAC OS X found on a MacBook would be considered a stand-alone operating system.

True

The VMware application of vMotion can be run through vCenter/vSphere to move VMs while they are still active.

True

The higher the version of ESXi, the more virtual hardware versions are supported.

True

VDI systems utilze thin clients.

True

VMware's vCenter is a virtual machine.

True

Windows HyperV would be an example of both a type 1 and 2 hypervisor.

True

Your Windows 10 must be running as a 64-bit system in order to run Hyper-v.

True

iSCSI can be accomplished over Ethernet frames.

True

Asymmetric key encryption requires how many keys?

Two

How many MAC OS X systems can be virtualized on an Apple iMAC?

Two

What two ways were shown to find out the hostname of a Windows PC?

Type hostname at the command prompt or using ipconfig /all.

Which description best describes MAC OS X?

UNIX

A URL always starts with a _____________

d. protocol

A automobile has an operating system that controls the fuel injection system, sparkplug firing, and the transmission system is considered to be a(n) ____________ operating system.

embedded

The Domain Name and hostname are the same for all computers.

fALSE

The vSphere system is normally accessed direclty by command line.

false

Which system has access directly to the CPU and its registers?

host OS

Which operating system must be put into place first?

host operating system

Most common workstation operating systems are of considered ______________.

network operating systems

Microsoft DOS is an example of a(n) ___________ operating system.

stand-alone

What type of encryption uses the same key for both encrypting and decrypting?

symmetric key encryption

The three most important tags that use attributes are links, lists, and ___________.

tables

A next generation firewall works on Layers 4-7 of the OSI Model, whereas regular firewalls only work on Layers 2 and 4 of the OSI Model.

true

An administrator of a cluster not only have full access to the cluster and hosts, but they can assign users to each host within the cluster.

true

Hypervisor programs are not required for running containers or container engines.

true

In the vSphere client, you can change the name of a VM.

true

It is the VPN firewall's task to decrypt data from remote clients to put on the corporate network and also to encrypt data going out to the corporate router, that is destined for the remote hosts.

true

vSphere can be used to manage multiple data centers in different locations.

true

What are the three things that you must define in order to set up vSphere actions?

who, what, and where

Which of the following is VMware's type 1 hypervisor of choice?

ESXi

What product from VMware is used to control multiple VMware type 1 hypervisors in a datacenter would be ___________.

ESXi

Disk striping requires a minimum of ___ disks.

2

As a minimum, RAID 5 requires ___ disk drives.

3

HyperV can only be installed on a system that is has ______________ architecture

64-bit

What is the current version of ESXi, vCenter, and/or vSphere?

7.2

iSCSI uses frames of ____ Bytes.

8KB

Match the connection type with the best description:

Adding additional data on existing phone lines. Very distance dependent. e. DSL Using coaxial antenna system to receive digital TV, music, VoIP, and data over the same system. (Defines broadband.) f. Cable System that uses a parabolic dish antenna to communicate with specific space objects that in turn, connect back to terrestrial systems. Usually has the highest latency. a. Satellite Legacy method of low bandwidth to connect to a provider c. Dialup Cellular technology that allows users to connect to the internet via their phone service b. 4G Using light frequencies through either plastic or glass as a conduit to connect. d. Fiber

When is the best time to install VMware Tools?

After installing the VM's OS

Fedora and CentOS both have Gnome ____________ built in as a type 2 hypervisor.

Boxes

What type of Virtual Network Adapter connects directly to the host network card's LAN?

Bridged

Match the appropriate product with its manufacturer or primary operating system.

Citrix f. Xen Orchestra Apple c. Parallels VMware d. ESXi Microsoft e. HyperV Fedora/CentOS b. GNOME Boxes Oracle a. Virtual Box

Which is an example of a container engine?

Docker

The RAM for a server-level RAID controller is of what type?

ECC

Which protocol is used in the SAN to communicate at high speed and is usually proprietary?

FC

A container registry is listed in a repository.

False

A normal laptop would usually possess a RAID 5 setup.

False

CIFS is the replacement for FCoE.

False

Data volumes for a server, would usually be set up with SCSI HDDs in a RAID 0 configuration.

False

Encrypted documents can be read by any key.

False

Encryption is simply encoding messages that anyone can read.

False

HyperV is an Oracle-Sun Microsystems product.

False

One disadvantage of RAID 0 is the loss of 50% of the total storage area.

False

One disadvantage of servers being virtualized is that a virtualized server pulls more current and electricity than a regular server.

False

ProxMox is a type 2 hypervisor.

False

TLS is used on Layer 7 of the OSI Model.

False

The term for servers that verify security certificates found on servers is a TLS server.

False

VMs can be deleted from inventory while they are powered on.

False

VMware Fusion is made to be installed on a Windows 10 computer.

False

VMware Fusion would perform the best on a Windows 10 x64 bit host system.

False

VMware's vSphere is a virtual machine running ESXi as an application.

False

Virtual hardware can only be changed or edited prior to the OS being installed.

False

____ is a file exchaning protocol developed for UNIX/Linux.

File Transfer Protocol*

What device protects a private network from unwanted incoming traffic?

Firewall

In which type of system would you most likely find a RAID 0 system?

Graphics Rendering System

Match the following systems with their descriptions:

Microsoft's implemention of containers a. Hyper-V Containers Large container engine meant to run a datacenter. d. Kubernettes Linux container engine that runs on top of Ubuntu as its OS e. LXC Container engine known for security and runs mainly on the command line b. Podman Largest of the container engines that is meant to be run on a single server. Uses containerd and promoted by Linux community c. Docker Not a container engine but a Type I Hypervisor f. ESXi

What program can be installed on MAC OS X as a downloadable type 2 hypervisor?

Parallels

Which form of RAID maximizes the read and write speed of hard drives?

RAID 0

SMB is used by Windows and Linux systems for WAN connections.

SMB is meant for LAN connections.

Which type of drives are not recommended for NAS/SAN deployment?

SSD

Which of the following would be a closed-source, licensed, operating system?

Solaris

A user can change their password by accessing which menu in vSphere's GUI?

User Options

What tool provides information on which Windows operating systems are able to work with specific versions of the ESXi host?

VMware Compatibility Guide

Which product can not perform snapshots?

VMware Fusion Player

Which application is produced by Oracle as a type 2 hypervisor?

Virtual Box

Microsoft had a product to allow the virtualization of its servers on Windows clients. The discontinued product, ______________ was a type 2 hypervisor for Microsoft servers that allowed them to be run on Windows clients

Virtual Server

__________ allows for live virtual machines to be moved between active ESXi servers.

Vmotion

RAID 0 is referred to as ________ __________.

b. Disk Striping

What does RAID 0 maximize?

b. Read & Write speeds

When do VPN clients encrypt their data to send to a corporate network?

before sending over the internet

Another term for the creation of a complete copy of a VM is referred to as a(n)

clone


Ensembles d'études connexes

Straighterline Anatomy and Physiology 1

View Set

Organization Behavior Chapters 3 + 4

View Set

FNP review Ch 13 Hematology & Immunology Disorders

View Set

CAE Cambridge English Advanced Testbook - mock test 3 Part 3

View Set

Chapter 1: Security and Risk Management (Domain 1)

View Set

Chapter 4 Quiz - Intro to Psychology

View Set

PSY104 Midterm 1 (Ch 1, 2, 11, 3, 4)

View Set