Microsoft - Bare Metal Prep

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What are the types of NIC teaming?

- Route based on the originating virtual port ID - Route based on IP hash -Route based on source MAC hash -Use explicit failover order

Dion Training is adding a new screen subnet that will host a large number of VDIs and wants to assign them a small portion of their public Class C IPv4 address space. Dion Training has been assigned a Class C scope of 187.15.3.0/24. There will be a total of 105 VDI clients that will each need an IP address assigned. What is the correct CIDR notation for the new subnet in order to accommodate the 105 VDI clients while allocating the minimum number of addresses?

/25

Your company's corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department's needs. What is the correct CIDR notation for the Sales department's subnet which requires 55 devices?

/26

Which of the following levels would an alert condition generate?

1

What is the broadcast address associated with the host located at 10.10.10.200/25?

10.10.10.255

What is the network ID associated with the host located at 205.12.35.26/27?

205.12.35.0

Your company has just installed a brand new email server, but you determined that the server cannot send emails to another server during your initial testing. You decide to check the firewall's ACL to see if the server's outgoing email is being blocked. Which of the following ports should you ensure is open and not blocked by the firewall?

25

(This is a simulated Performance-Based Question. On the real exam, you may be given a chart with numerous ports and protocols and be asked to drag and drop them to match the ports with the protocols.) What ports do SMTP and SNMP utilize?

25, 161

Which of the following protocols are designed to avoid loops on a Layer 2 network?

802.1d

Which of the following IEEE specifications describes the use of power over ethernet (POE)?

802.3af

Spanning Tree Protocol

A data link layer protocol that prevents loops in networks with redundant links

Explain Cluster

A logical grouping of multiple ESXi hosts and HA and DRS are provided on the cluster.

EtherChannel

A port-channel architecture that groups together multiple physical Ethernet links into a single logical link that provides fault-tolerant, high-speed, and redundant links between switches and other network devices

What is ESXi?

A secure OS architecture that includes and integrates essential OS components like the Kernel for deploying and managing VMs

What is a vSwitch

A software-based switch used to connect VMs to the ESXi host and provide connectivity between the VMs on that vSwitch. vSphere standard switch is referred to as a vSwitch. Each ESXi host requires its own vSwitch

You run the command ipconfig on your laptop and see that you have been assigned an IP address of 169.254.0.56. Which category of IPv4 address is this?

APIPA

Your company has installed a guest wireless network in the break room. According to company policy, employees may only connect to the network and use it during their lunch break. Which of the following policies should you have each employee sign to show they understand and accept the use conditions for this guest network?

AUP

What is MAC Address Changes?

Allows MAC spoofing for inbound traffic and is accepted by default

What is Forged Transmits?

Allows a VM to spoof its MAC for outbound traffic and is enabled by default. Is good for when a host is converted to a VM and there's software licensed to a specific MAC

What's the importance of snapshots?

Allows quick and easy save of state of a VM.

What is Promiscuous Mode?

Allows sniffing of all traffic on a vSwitch. Best to only enable when needed and then disable when done

What is a clone?

An identical copy of a VM (called a parent VM). MAC and UUIDs for both cloned and parent will be different. Changes made to the cloned VM won't impact the parent VM and vice versa Can turn it on/off Can't convert a cloned VM back to a parent VM Ideal for test environments or DR environments Not recommended for large deployments of VMs The VM that is powered on can be cloned

What is a bitmap?

An index of where bits are stored in memory

Which of the following communication types can only be used with IPv6?

Anycast

What is OSI Layer 7

Application

What does traffic shaping do?

Applies peak bandwidth, average bandwidth, and burst size policies to a specific port group

Which of the following weaknesses exist in WPS-enabled wireless networks?

Brute force occurs within 11,000 combinations

You have just finished installing a small network consisting of a router, a firewall, and a single computer. The computer is connected to the firewall and the firewall is connected to the router. What type of physical network topology have you created in this scenario?

Bus

Which of the following policies or plans would dictate how an organization would respond to an unplanned outage of their primary internet connection?

Business continuity plan

How can multiple VMs talk to each other without having to connect to a physical switch?

By connecting to the same Port Group

Which media access control technology will listen to a cable to ensure there is no traffic being transmitted before sending its traffic but will implement a back-off timer if a collision does occur?

CSMA/CD

Which of the following provides a standard nomenclature for describing security-related software flaws?

CVE

Last night, your company's system administrators conducted a server upgrade. This morning, several users are having issues accessing the company's shared drive on the network. You have been asked to troubleshoot the problem. What document should you look at first to create a probable theory for the cause of the issue?

Change management documentation

You have been asked to install a media converter that connects a newly installed RG-6 cable to the existing single-mode cable plant. Which type of media converter should you use?

Coaxial to fiber

What would be used in an IP-based video conferencing deployment?

Codec

Explain cold and hot migration

Cold migration - the process of migrating a powered off vm, including its configuration and data from a single host to another. Can migrate manually or set up a scheduled task. Hot migration - the process of migrating a powered on vm from a single host to another. AKA a live migration

Explain iSCSI storage

Communication between the host and storage array occurs over TCP/IP protocol, and ESXi hosts are configured with an iSCSI initiator (either hardware or software based)

John is investigating a performance issue on a server and has begun by gathering its utilization statistics. John notices that the statistics are outside of the normal, acceptable ranges. What should John do next?

Conduct a baseline review

Jason wants to use his personal cell phone for work-related purposes. Because of his position, Jason has access to sensitive company data, which might be stored on his cell phone during its usage. The company is concerned about this but believes that it might be acceptable with the proper security controls in place. Which of the following should be done to protect both the company and Jason if they allow him to use his personal cell phone for work-related purposes?

Conduct real-time monitoring of the phone's activity and usage

A network technician wants to centrally manage the switches and segment the switches into separate broadcast domains. The Dion Training network is currently using VLAN 1 for all of its devices and uses a single private IP address range with a 24-bit mask. Their supervisor wants VLAN 100 to be the management subnet and all of the switches must share VLAN information. Which of the following should the technician configure to meet these requirements?

Configure VTP and 802.1q on the inter-switch connections with native VLAN 100. Configure VLSM for the IP address range.

Alexander needs to set up two public-facing web servers and ensure that an attacker cannot access its intranet if those servers are compromised. Which of the following should he use?

DMZ

Which of the following types of telecommunication links is used to provide high-speed internet service over a traditional phone line?

DSL

What is OSI Layer 2

Data Link

You have recently been hired as a security analyst at Dion Training. On your first day, your supervisor begins to explain the way their network is configured, showing you the physical and logical placement of each firewall, IDS sensor, host-based IPS installations, the networked spam filter, and the DMZ. What best describes how these various devices are placed into the network for the highest level of security?

Defense in depth

Explain VMware DRS

Distributed Resource Scheduler provides a way to schedule and balance resources across a vSphere environment. Through the use of clusters and resource pools, virtual environments are able to automatically balance available resources across hosts. DRS uses VMware HA to move VMs from one host to another to ensure that resources are evenly distributed among them.

You are troubleshooting a network connectivity issue for clients on the Dion Training corporate network. You have identified a rogue DHCP server connected to the network by one of the employees. Which of the following symptoms would most likely be observed due to this rogue DHCP server operating on the network?

Duplicate IP addresses

What is NIC teaming based on originating virtual port ID?

Each VM is connected to a virtual port on a vSwitch and based on the virtual port ID ID that the VM connects to, the traffic will go through a specific VMNIC. So, different VM's will connect to different port IDs going through different VMNICs

How many vSwitches can each VMNIC be assigned to?

Each VMNIC can only be assigned to a single vSwitch

What is the use of vMotion?

Enables migration of active VMs from one ESXi host to another with zero downtime

A technician is attempting to resolve an issue with users on the network who cannot access websites like DionTraining.com and Google.com. The technician can ping their default gateway, DNS servers, and the website using its IP address successfully. The technician tries to use the command "ping diontraining.com" and receives an error message stating "Ping request could not find host diontraining.com." Which of the following actions should the technician attempt next to resolve this issue?

Ensure port 53 is enabled on the firewall

What is the vCloud Suite?

Enterprise grade cloud and management solution. A collection of multiple VMware components to build and provide a completely integrated cloud infrastructure, including virtualization, software defined datacenter services, disaster recovery, and application management

Will FT work if vCenter goes down?

FT on a VM can only be enabled through vCenter but doesn't require vCenter to be online once configured

Explain FT logging traffic

Fault tolerance logging traffic is considered as the second network requirement. For continuous data syncing between primary and secondary VMs, FT applies FT logging. This is a VMkernel connection type used to move nondeterministic events from primary to secondary VMs

What is VMware Fault Tolerance (FT)?

Generally works on VM level. A secondary VM is created and maintained that is identical to the primary and can replace it when the ESXi host fails to provide continuous availability of VMs. A complete copy of a VM is made, including storage, computation, and memory. A 10GB NIC is recommended

What is VMware HA?

Generally works on cluster level by pooling VMs and the hosts they reside on into a cluster. VMs running on a failed host are forced to be restarted on alternate hosts

Explain port group

Groups of virtual ports on a virtual switch. Provides a stable anchor point for VMs connected to labeled networks by aggregating multiple ports into a single configuration. Every port group is assigned a network label, which is unique to the host. VLAN tags are shared by each port group member.

What's the difference between HA and FT?

HA is enabled per cluster and FT is enabled per VM HA system will restart on power on VMs on another host in the event of a failure, while FT system will activate the second copy in case of loss of primary host. By providing fast backup and continuous availability, it reduces downtime

Which of the following is a logical host on the network that is configured with known vulnerabilities so that an attacker's techniques can be studied in order to improve your network defenses?

Honeypot

Which of the following would be the BEST addition to a business continuity plan to protect the business from a catastrophic disaster such as a fire, tornado, or earthquake?

Hot sites or cold sites

Which network device operates at Layer 1?

Hub

Your company has decided to begin moving some of its data into the cloud. Currently, your company's network consists of both on-premise storage and some cloud-based storage. Which of the following types of clouds is your company currently using?

Hybrid

Which encryption type MOST likely is used for securing the key exchange during a client-to-server VPN connection?

ISAKMP

Dion Training's corporate network appears to be suffering from a broadcast storm and you have been asked to assist in troubleshooting. You just arrived in the main distribution frame and see another technician looking at the equipment rack. What step of the troubleshooting methodology should you perform NEXT?

Identify the problem

Timothy, a network technician, receives a phone call from an end-user who states their laptop cannot connect to the corporate wireless network. Which of the following should the technician do FIRST according to the troubleshooting methodology?

Identify the problem

You have been assigned to assist with deploying a new web-based application to your company's intranet. After installing the application, it was identified that the database server is becoming overloaded by the number of requests that the users create. The team lead has proposed adding a device between the web server and the database server to alleviate the issue. Which of the following is being implemented by adding this new device?

Implement load balancing and provide high availability

Which type of threat actor can accidentally or inadvertently cause a security incident in your organization?

Insider threat

You are working as part of a network installation team. Your team has been asked to install Cat 5e cabling to some new offices on the building's second floor. Currently, the office only has one network closet, which is located on the first floor. Your team spent the morning running 24 new CAT 5e cables from a patch panel in the networking closet on the first floor to a new networking closet you are outfitting on the second floor. Your team terminated these cables in a new patch panel in the 2nd-floor closet. You measured the distance from the switch in the 1st-floor closet to the new 2nd-floor patch panel and determined it was 80 meters. The team then ran cables from this patch panel to each of the new offices. Some of the offices are working properly, but others are not. You suspect that some of the cable runs are exceeding the maximum length allowed by Cat 5e cabling. What is the BEST solution to this problem?

Install a switch in the second floor networking closet to increase the signal

Provisioning TCP/IP Stack

Isolates some virtual machine-related operations, such as cold migrations, cloning, snapshot, or NFC traffic

vMotion TCP/IP Stack

Isolates vMotion traffic onto its own stack. The use of this stack completely removes or disables vMotion traffic from the default TCP/IP stack. Allows vMotion traffic to be pointed to a different IP network. Useful for long distance vMotion

Which of the following describes the ID of a specified native VLAN when traffic passes over a trunk?

It becomes the default VLAN for untagged frames

What happens if a VMNIC fails?

It can automatically switch over to a functional VMNIC

When using NIC teaming by IP hash what happens if a VM sends packets to to multiple IPs?

It can use a different VMNIC

What happens when you have traffic shaping enabled and there's a large file that needs transferring?

It could transfer at a higher rate, up to but not exceeding the peak bandwidth size, only until it hits its burst size

Explain VMKernel and its importance

It's the OS that runs directly on the ESXi host. Acts as an interface between VMs and the physical hardware. Abstracts hardware and provides OS services i.e. allocating memory and scheduling CPU. Handles services i.e. vMotion, Fault Tolerance, NFS, and iSCSI

Which of the following network performance metrics is used to represent variable delay experienced by a client when receiving packets from a sender?

Jitter

What describes an IPv6 address of ::1?

Loopback

A company owns four kiosks that are near a shopping center. The owner is concerned about someone accessing the Internet via the kiosk's wireless network. What should be implemented to provide wireless access only to the employees working at the kiosk?

MAC filtering

Which of the following needs to be configured to allow jumbo frames on a network?

MTU

Default TCP/IP Stack

Manage the host-related traffic services. This stack shares a single default gateway between all configured network services.

What is a VMware template?

Master copy of a VM that's capable of creating and provisioning VMs. Can be used to make many clones Can't work independently Can't turn on/off or edit a template Can be converted back to a VM and updated with the latest configuration before being converted back to the template Works well for deployment of mass VMs in production environments A powered on VM can't be used to create a template

What's the advantage of a VM running under a type 1 hypervisor?

More secure than type 2 since they don't rely on the underlying OS. Running directly on the hardware provides more efficiency, performance, and speed since there's no dependencies

(This is a simulated Performance-Based Question.) You are a network administrator troubleshooting an issue with a newly installed web server. The web server is available to internal network users, but users outside the internal network (Internet users) cannot reach the server. You run an IPCONFIG and receive the configuration below: IP: 192.168.0.10 Netmask: 255.255.254.0 Gateway: 192.168.0.2 DNS: 10.10.0.255

NAT has not been configured on the border firewall

Explain NFS and VMFS

NFS - file sharing protocol between NAS devices and ESXi hosts VMFS - (Virtual Machine File System) in vSphere it's a block level file system that stores VM files

What configuration settings should you watch out for on the physical switch when using NIC teaming based on IP hash?

Needs to be configured with EtherChannel

What configuration specifications need to be applied to the physical switch for NIC teaming based on originating virtual port ID?

Needs to be configured without port channel or LACP because each VMNIC connection needs to be independent

What is OSI Layer 3

Network

A client reports that half of the office is unable to access a shared printer on the network. Which of the following should the network technician use to troubleshoot the issue?

Network diagrams

Explain Promiscuous mode

Network security, monitoring and administration method that allows any network adapter configured on a host system to access all network data packets. Can specify at the vSwitch or port group level in vSphere. Essentially a method for sniffing network traffic. You have 2 options: accept or reject. All communications will be visible to all VMs if set to accept.

What is considered a classless routing protocol?

OSPF

How many VLANs are typically assigned to a Port Group?

One

(This is a simulated Performance-Based Question. If this was the real certification exam, you would be asked to drag-and-drop the correct encryption onto the APs.) Your company has purchased a new office building down the street for its executive suites. You have been asked to choose the BEST encryption for AP1, AP2, and AP3 to establish a wireless connection inside the main building for visitors to use. Your boss has stated that the main building's internal wireless network is only going to be used by visitors and should not require the visitors to set up any special configuration on their devices to connect. Which of the following is the BEST encryption to use from the options below to meet your manager's requirements for the new visitors' Wireless Network?

Open

What are the benefits of using VMs instead of physical hardware

Operational flexibility Reducing Overhead Centralization Scalability Disaster Recovery

Which of the following is a DNS record type?

PTR

Which of the following policies or plans would dictate the complexity requirements for a wireless network's shared secret key?

Password policy

You have just moved into a new apartment in a large building. Your wireless network is acting strangely, so you are worried that it may be due to interference from the numerous other wireless networks in each of the other apartments in this building. You want to determine what wireless signals are within the walls of your apartment and their relative strength. What technique should you utilize to determine whether the nearby wireless networks are causing interference with your own Wi-Fi network?

Perform a site survey

A company has just installed a VoIP system on its network. Before the installation, all of the switches were replaced with layer 3 multilayer switches to allow for the VoIP devices to be placed on separate VLANs and have the packets routed accurately between them. What type of network segmentation technique is this an example of?

Performance optimization

What is OSI Layer 1

Physical

Dion Training has configured a new web server and connected it to their screened subnet. A network technician wants to ensure the server is properly hardened and that it only allows inbound HTTPS requests while blocking any HTTP requests. Which of the following tools should the technician utilize?

Port scanner

What is OSI Layer 6

Presentation

Dion Training wants to purchase an email marketing solution to better communicate with their students. A promising new startup has a new offering to provide access to their product from a central location rather than requiring Dion Training to host the product on their internal network. Dion Training wants to ensure that their sensitive corporate information is not accessible by any startup's other clients. Which type of cloud server should Dion Training look to purchase to meet these needs?

Private SaaS

Your boss is looking for a recommendation for a cloud solution that will only allow your company's employees to use the service while preventing anyone else from accessing it. What type of cloud model would you recommend to ensure the contents are best secured from those outside your company?

Private cloud

The corporate network uses a centralized server to manage credentials for all of its network devices. What type of server is MOST likely being used in this configuration?

RADIUS

Which of the following remote access protocols should you use to connect to a Windows 2019 server and control it with your mouse and keyboard from your workstation?

RDP

Which of the following is a security concern with using a cloud service provider and could result in a data breach caused by data remnants?

Rapid elasticity

What is RDM

Raw Device Mapping - the RDM files are contained in VMFS and act as proxies for raw physical devices. Enables VMs to access LUNs directly, eliminating the need to use VMFS because the LUN can be formatted using any file system like NTFS. Beneficial for cluster configurations but some limitation could be the inability to map disk partitions and possibly not working with direct-attached block devices.

Port-Channel

Refers to communication links between switches that combine multiple ethernet ports bandwidth into a single logical link

Which of the following policies or plans would dictate which type of virtual private network connections will be authorized for use by an organization's employees?

Remote access policy

Today, your company's network started to experience network connectivity issues for various workstations around the company. As you begin troubleshooting, you identify that all the workstations receive their connectivity from a single switch on the 3rd floor of the office building. You start searching the 3rd floor for the cause of this issue and find a small wired router plugged into a network jack in the sales manager's office. From this small wired router, he has connected his workstation and a small Smart TV to watch Netflix while working. You question the sales manager about when he brought in the new router. He states that he just hooked it up this morning. What type of issue did the sales manager accidentally introduced into the network by installing the router?

Rogue DHCP server

You are about to perform a major configuration upgrade to a network device. What should you have prepared in case the upgrade fails?

Rollback plan

You need to connect your laptop to a router in order to add a static route. What type of cable would you use to connect to the router's console port?

Rollover - has a RS-232 (DB-9) on one side and an RJ-45 on the other

A network's design includes gateways connecting an assembly-line network. The assembly-line network uses specialized cabling and interfaces to allow the assembly-line robots to communicate with one another. Which type of network would you classify this design as?

SCADA/ICS

A network administrator has determined that the ingress and egress traffic of a router's interface are not correctly reported to the monitoring server. Which of the following can be used to determine if the router interface uses 64 bit versus 32-bit counters?

SNMP Walk

Dion Training has just purchased a new domain name and needs to indicate which DNS server is the definitive information source for the domain. Which type of DNS record should be created?

SOA (start of authority)

An analyst reviews a triple-homed firewall configuration that connects to the internet, a private network, and one other network. Which of the following would best describe the third network connected to this firewall?

Screened subnet

What is NIC teaming based on IP hash?

Selects a VMNIC based on a hash of the source IP and the destination IP

What are the different types of virtualization

Server Network Application Desktop Storage

What is OSI Layer 5

Session

What happens if you have vSwitch security settings and port group security settings that conflict?

Since vSwitch security settings are global the port group level overrides them

What are beacon probes?

Small packets that VMNICs send out to each other to make sure they're still operating well

In which type of non-technical attack does an attacker attempt to trick a user into providing sensitive information?

Social engineering

Which of the following types of traffic flows describes network traffic that is entering your datacenter through the firewall or router?

South

A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation within the network?

Spanning tree

What is NIC teaming?

Specifies how a vSwitch load balances the outgoing traffic between the physical NICs in a team

Tim, a network administrator, is configuring a test lab that consists of three routers using RIP for dynamic routing. He connects the routers in a full mesh topology. When he attempts to ping Router 1 from Router 3 using its IP address, he receives a "Destination Unreachable" error message. Which of the following is the most likely reason for the connectivity error?

Split-horizon is misconfigured

There are two switches connected using both a Cat 6 cable and a Cat 5e cable. Which type of problem might occur with this setup?

Switching loop

You have been asked to select the best WAN connection for a new network at Dion Training. The company has stated that they must have a guaranteed throughput rate on their Internet connection at all times. Based on this requirement, what type of WAN connection should you recommend?

T-1

While working as a security analyst, you have been asked to monitor the SIEM. You observed network traffic going from an external IP to an internal host's IP within your organization's network over port 443. Which of the following protocols would you expect to be in use?

TLS

What configuration settings do you need to watch out for on the physical switch with NIC teaming based on source MAC hash?

That port channel and LACP are not configured

After installing some new switches in your network, you notice that a switching loop has begun to occur. You contact the manufacturer's technical support for your switches and they recommended that you enable 802.1d. Which of the following BEST represents why the manufacturer suggested this?

The Spanning Tree Protocol uses BPDU to detect loops in network topologies

You have just installed a new switch in your company's network closet. The switch connects to your router using an SFP port on both the router and switch. Unfortunately, you only had a long cable available to make the connection, so after running the cable from the rack containing the switch to the other rack containing the router, you decide to coil up the excessive cable and use a zip tie to hold the coil to the side of the rack. You head back to your office, log into the switch over SSH, and check the log file. You notice that several messages indicate that the signal strength on the transmit portion of the SFP is registering as too weak. What is the BEST explanation for the cause of this error?

The bend radius of the cable has been exceeded

What happens if a VMNIC can't send out a beacon probe successfully?

The host will kill the VMNIC and route traffic through another VMNIC

How can two VMs on separate VLANs communicate to each other?

They'll need to send packets onto the physical network through a trunk port that can handle multiple VLANs on a single physical connection to a switch and then a router that can route between the VLANs

Which of the following features is supported by Kerberos but not by RADIUS?

Tickets used to identify authenticated users

In traffic shaping when the burst size is hit what happens?

Traffic is limited back down to 50Mbps until it builds its burst size back up. It'll need to stay below the average bandwidth long enough to build up the burst size before peak bandwidth can be used again

What is OSI Layer 4

Transport

What are the types of Hypervisor?

Type 1 - bare metal Type 2 - hosted

Which network element enables unified communication devices to connect to and traverse traffic onto the PSTN?

UC Gateway

How many CPU's can be used for a VM in FT in vSphere 7.0?

Up to 8 vCPUs can be used with the VMware vSphere Enterprise Plus license

A network administrator is tasked with building a wireless network in a new building located next door to your company's office building. The wireless clients should not be able to communicate with other wireless clients but should be able to communicate with any wired users on the network. The users must be able to seamlessly migrate between the buildings while maintaining a constant connection to the LAN. How should the administrator configure the new wireless network in this new building?

Use the same SSIDs on different channels and AP isolation

Dion Training has a single switch that services every room within its offices. The switch contains 48 ports, but Jason wants to divide the ports based on functional areas, such as web development, instruction support, and administration. Which technology should Jason utilize to divide the physical switch into three logically divided areas?

VLAN

What does Port Group define?

VLAN membership and security policies

Write 3 port groups that are configured in ESXi networking

VM Port Group - used for VM Network Service Console Port Group - used for Service Console Communications VMKernel Port Group - used for vMotion, iSCSI, NFS Communications

What is NIC teaming by Source MAC hash?

VM connects to a specific VMNIC based on its MAC hash

How does vMotion work in the background?

VM memory state is copied over the vMotion network from the source host to the target. Users still have access to the VM and potentially update pages in memory. A list of modified pages in memory is kept during a memory Bitmap on the source host

How can I differentiate between virtual machine port groups and VMkernel port groups?

VM port group passes regular VM traffic and a VMkernel port group passes vSphere specific traffic

What kind of traffic goes over VM Port Groups vs. VMkernel ports?

VM port groups are for all VM traffic and everything else is handled by a VMkernel port (i.e. IP storage, management and vMotion)

What happens if vMotion fails?

VM won't be migrated if the target host doesn't have enough memory. Can move to another ESXi host providing guaranteed memory, or by reducing the VMs memory reservation

What are the physical NICs on an ESXi host called that connect to a physical switch?

VMNICs

What ports do the host and vCenter use to communicate about things other than VM traffic?

VMkernel ports

Which of the following protocols must be implemented for two switches to share VLAN information?

VTP (VLAN Trunking Protocol)

A technician has been troubleshooting a network problem, has determined the likely cause of the issue, and implemented a solution. What is the NEXT step they should perform according to the CompTIA troubleshooting methodology?

Verify system functionality

An administrator's router with multiple interfaces uses OSPF as its routing protocol. You have discovered that one of the router's interfaces is not passing traffic. You enter the "show interface eth 0/0" command at the CLI and receive the following output: Fast Ethernet 0/0 is up, line protocol is down

Verify the cable is connected to eth 0/0

Your physical security manager, Janice, wants to ensure she can detect any unauthorized access to the data center. Which technology should be used to meet her requirement?

Video surveillance

What is VDI?

Virtual Desktop Infrastructure - users can host a desktop OS on a server and access VM based desktops remotely. A type of IaaS which can run in a private or public cloud. Users access their desktops with thin clients

Explain the .vmdk file

Virtual Machine Disk is an open file format used to store the content of a virtual HDD. In vSphere 5.5+ it can be 62TB

What does VVol mean?

Virtual Volume for managing virtual disks. Whenever a virtual disk is created in a virtual environment a VVol is automatically created

What device is used to configure various hypervisor guests to use different VLANs in the same virtualization environment?

Virtual switch

Which of the following should be implemented to allow wireless network access for clients in the lobby using a shared password as the key? Firewall WPA2 (Correct) Geofencing IPsec

WPA2

A network technician has just installed a new point-to-point 200-meter single-mode fiber link between two local routers within the Dion Training offices. The fiber has been connected to each router, but the interface fails to come up. The network technician has double-checked the interface configuration on both routers, both SFPs have been hard looped to confirm they are functioning, connectors on both ends of the links have been cleaned, and there is sufficient power. What is the MOST likely cause of the problem?

Wavelength mismatch

A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. The warehouse workers must scan and concurrently upload large images of items to a centralized server. Which of the following technologies should they utilize to meet these requirements?

WiFi

What is VM Monitoring status?

Would restart the virtual machine if the VMware tools heartbeat wasn't received within the specified time using Monitoring sensitivity

Is HA dependent on VMware vCenter Server?

Yes, but only during initial configuration

How does traffic shaping peak bandwidth policy work?

You can limit peak bandwidth to whatever you want, 100Mbps for example so bandwidth will always be at or below that amount

How does traffic shaping average bandwidth policy work?

You can set the average bandwidth to whatever you want, 50Mbps for example so that all traffic needs to average out to 50Mbps

You are working as a penetration tester and have discovered a new method of exploiting a vulnerability within the Windows 10 operating system. You conduct some research online and discover that a security patch against this particular vulnerability doesn't exist yet. Which type of threat would this BEST be categorized as?

Zero-day

Where does a VM send packets to?

a vNIC that connects to a Port Group on a vSwitch

Mathan has just purchased a domain name and created an A record to bind his domain name to an IP address. Which of the following tools should he use to verify the record was created properly?

dig

You are assisting a member of Dion Training's security team during an incident response. The team member asks you to determine if any strange TCP connections are occurring on a given workstation. You open the command prompt on the workstation. Which of the following tools would provide you with information on any TCP connections currently established on the workstation?

netstat

How does NIC teaming based on IP hash work for non-IP packets?

the switch uses the data at those fields to compute the hash

You are working as a service desk analyst. This morning, you have received multiple calls from users reporting that they cannot access websites from their work computers. You decide to troubleshoot the issue by opening up your command prompt on your Windows machine and running a program to determine where the network connectivity outage is occurring. This tool tests the end-to-end connection and reports on each hop found in the connection. Which tool should you use to determine if the issue is on the intranet portion of your corporate network or if it is occurring due to a problem with your ISP?

tracert

Write 4 core elements of the VMkernel networking layer

vSAN Fault Tolerance IP Storage vMotion

What's the difference between vSphere and vCenter?

vSphere - the virtualization infrastructure product as a whole. Includes the ESXi hypervisor, and vCenter vCenter - the centralized platform to manage the virtual infrastructure from a single console. Control hosts, VMs and optimize routine operations and daily tasks.

Which version of vSphere introduced multiple TCP/IP stacks and what are they?

vSphere 6: Default TCP/IP Stack vMotion TCP/IP stack Provisioning TCP/IP stack

What are vSS and vDS?

vSphere Standard Switch (VSS) - the default vSwitch for ESXi allows VMs on one physical host to communicate with one another. The switch controls how a VM communicates with another VM on the same physical server just like a physical switch would vSphere Distributed Switch (vDS) - Acts as a single switch in a virtual environment and provides central provisioning, administrative, and monitoring capabilities for virtual networks. Supports advanced networking feature in vSphere.

What levels can you configure security settings?

vSwitch level or port group level


Ensembles d'études connexes

MID-TERM FINANCIAL INSTITUTIUON CH. 4

View Set

Ch 11 Course Point Patho taken from http://thepoint.lww.com/Book/Show

View Set

Domain I - Health & Fitness Assessment

View Set

Nclex Review: Depression, Depression NCLEX, Bipolar Disorder NCLEX, Schizophrenia NCLEX Questions, Schizophrenia NCLEX questions, Schizophrenia NCLEX part 2, NCLEX Schizophrenia

View Set

CCNA CISCO 1 Practice Final Exam (Partial)

View Set

Chapter 15: Assessing Head and Neck

View Set

Principles of Finance - Chapter 19 and Smartbook

View Set

Chapter 6: Disorders of the Breasts

View Set

TCI: History Alive: The Ancient World: Chapter 25

View Set

AP Geography: Where is Industry Distributed?

View Set

How the Brain Processes Visual Information

View Set

8.1 Studying and Encoding Memories

View Set

Chapter 15 Global Marketing and the Digital Revolution

View Set