Virtualization Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A VMFS iSCSI based data store can't be dynamically expanded due to the nature of the VMFS file system structure. True False

False

A standard vSphere virtual switch can have a maximum of 120 ports. True False

False

Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller. True False

False

NIC teaming policies are set for an entire standard switch, and cannot be changed at the port group level. True False

False

Each VMkernel port must be configured with its own IP address and gateway. True False

True

Some VMware license keys can be split by applying them to multiple assets. For example, a four-CPU license can be split by applying it to 2 two-CPU hosts. True False

True

The e1000 network adapter type is the default adapter used by vSphere for virtual machines that run 64-but guest operating systems. True False

True

The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server. True False

True

VMware vSphere 6 provides support for USB 3.0 devices in virtual machines. True False

True

When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the vpxa process. True False

True

When running the vmkfstools command with the --server option pointing to a vCenter Server system, what option should be used to select the proper ESXi host to run the command against? a. --vihost b. --esxi c. --targethost d. --destsrv

a. --vihost

What is the maximum number of extents that can be added to any VMFS data store? a. 32 b. 64 c. 8 d. 16

a. 32

While using vSphere for free, you are limited to how many virtual CPUs? a. 8 b. 32 c. 128 d. 1

a. 8

After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port? a. A RARP request is sent to notify the network that the MAC is now on a new port. b. A multicast packet is sent to notify the network of the change. c. The host forces the network switch to clear it's MAC address table so that the MAC is flooded out all ports. d. The MAC address aging timer must expire, after which a learning period occurs, and the MAC is registered on the new port.

a. A RARP request is sent to notify the network that the MAC is now on a new port.

What statement regarding the use of iSCSI extents is accurate? a. A VMFS data store can be expanded as long as there is free space available in the extent. b. Extents can be added to any VMFS data store, up to 16 extents per data store. c. An extent can be resized at will, provided there is adequate storage available. d. A VMFS data store that is created on an extent cannot be resized.

a. A VMFS data store can be expanded as long as there is free space available in the extent.

A virtual machine providing services for your network was recently hacked and used to spoof MAC addresses on your network to target other systems. What policies could you set to prevent this from reoccurring? a. The MAC address changes and forged transmits policies should be set to "Reject". b. Only the promiscuous mode needs to be set to reject. c. The promiscuous mode and the forged transmits policies should be set to "Reject" d. The promiscuous mode and MAC address changes policies should be set to "Reject".

a. The MAC address changes and forged transmits policies should be set to "Reject".

You are using a gigabit Ethernet adapter (vmnic1) on an ESXi host, and you have found that the status screen displays the adapter as being connected at 100 Mb, full duplex. You have verified that the switch your server connects to has 1 Gbps capable ports. What is most likely the problem? a. The adapter has been manually configured to a speed of 100 Mb, duplex operation. b. The cable connecting the server and switch is damaged. c. The adapter's driver in ESXi does not have 1 Gbps capability. d. The virtual machine using vmnic1 has limited the speed of the interface.

a. The adapter has been manually configured to a speed of 100 Mb, duplex operation.

What statement regarding the use of lockdown mode is accurate? a. The root user is still able to log in via the DCUI console. b. The lockdown mode only affects the use of the vCLI. c. The vCLI and DCUI options are still available for use by any user. d. A user may access ESXi hosts individually as long as they are members of the "Local Admins" role.

a. The root user is still able to log in via the DCUI console.

A security policy has been applied to an individual port on a virtual switch. The switch itself has a conflicting policy configured. What setting has priority? a. The settings on the port will have priority, because the policy is overridden at the port level. b. The overall setting will be disabled until the conflicting settings are manually changed. c. The more restrictive setting will be used automatically. d. The settings at the virtual switch level will have priority, as the policy is inherited by the port.

a. The settings on the port will have priority, because the policy is overridden at the port level.

After removing a static software based iSCSI target, you discover hours later that the target has been returned to the list of targets. What is the most likely cause? a. The static target was added via dynamic discovery, and a rescan operation has re-added it. b. You do not have the proper permissions to remove a static target, causing the job to remove the target to fail. c. The static target cannot be removed without deleting all associated data stores utilized by the host. d. The iSCSI initiator cannot remove a target that has been configured by vCenter Server for use on the host

a. The static target was added via dynamic discovery, and a rescan operation has re-added it.

What is NOT a part of the VMware vCenter services component of vCenter Server? a. VMware Certificate Authority b. Auto Deploy service c. Inventory database service d. Web Client

a. VMware Certificate Authority

You are attempting to migrate a virtual machine to a different host. The new host has an Intel processor, while the old host has an AMD processor. What type of migration must be performed? a. cold migration b. suspended migration c. Enhanced vMotion migration d. vMotion migration

a. cold migration

What traffic shaping policy option determines the max number of kilobits per second to allow across a port when it is sending a burst of traffic? a. peak bandwidth b. average bandwidth c. surge bandwidth d. burst size

a. peak bandwidth

What term is used to describe the top most object in the vCenter Server inventory? a. root object b. head node c. top host d. primary branch

a. root object

You are trying to support a VOIP application on a virtual machine, and need to prioritize VOIP traffic. What kind of virtual switch policy should you use? a. traffic shaping policy b. security policy c. application priority policy d. NIC teaming policy

a. traffic shaping policy

What is the maximum number of vCPUs supported by the fully licensed version of the vSphere hypervisor? a. 8 vCPUs b. 128 vCPUs c. 16 vCPUs d. 64 vCPUs

b. 128 vCPUs

What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support? a. A clustered application that shares its IP address with other instances. b. A network monitoring application such as an intrusion detection system (IDS). c. A web server with multiple virtual host configurations. d. An e-mail server that utilizes load balancing features.

b. A network monitoring application such as an intrusion detection system (IDS).

You are attempting to utilize a packet capturing software in your studies of a network's traffic, however, your virtual machine running on vSphere is unable to put the network adapter in promiscuous mode. What is the most likely reason for the failure? a. vSphere is connected to the network via a switch, and therefore cannot change to promiscuous mode. b. A network security policy is preventing the use of a promiscuous mode interface. c. vSphere does not support the use of promiscuous mode devices. d. The virtual machine hardware compatibility mode is limiting the virtual machine to legacy adapters.

b. A network security policy is preventing the use of a promiscuous mode interface.

What is used by CHAP to verify the identity of a host? a. Pre-approved host list b. A three way handshake and private keys c. network MAC address database d. host certificates

b. A three way handshake and private keys

What is NOT a part of the VMware platform services component of vCenter Server? a. License service b. Inventory database service c. Lookup service d. vCenter Single Sign On

b. Inventory database service

What happens when ESXi hosts are put into lockdown mode? a. No users are able to log into ESXi hosts through vCenter, they must log in directly. b. No users are able to log into ESXi hosts, they must authenticate with vCenter Server. c. The ESXi server no longer allows virtual machine modifications or changes in running state. d. The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server.

b. No users are able to log into ESXi hosts, they must authenticate with vCenter Server.

While adding a new ESXi host and configuring a NAT adapter, you receive a warning that one or more hosts have no assigned physical network adapters. What should be done? a. The host has no compatible network adapters, so a dedicated supported adapter should be installed. b. The "Assign uplink" icon should be selected after the NAT network adapter is added. c. The host's vmnet8 interface is not configured. d. The vswitch0 virtual switch on the host has no configured adapters.

b. The "Assign uplink" icon should be selected after the NAT network adapter is added.

What statement regarding the vpxa process is accurate? a. The vpxa process controls access to the virtual machines and storage volumes on an ESXi host. b. The vpxa process serves as an intermediary between the vpxd process and the hostd process. c. The vpxa process is responsible for managing most of the operations on the ESXi host. d. The vpxa process communicates commands from the vSphere client to the hostd process.

b. The vpxa process serves as an intermediary between the vpxd process and the hostd process.

What virtual machine configuration file holds the virtual machine's snapshot state information? a. VM_name.vswp b. VM_name.vmss c. VM_name.vmdk d. VM_name.vmsd

b. VM_name.vmss

You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use? a. cold migration b. enhanced vMotion c. suspended migration d. vMotion migration

b. enhanced vMotion

What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server? a. trait b. privilege c. role d. ability

b. privilege

What virtual disk file type takes the longest to create? a. thick provision lazy zeroed b. thick provision eager zeroed c. thin provision lazy zeroed d. independent provision

b. thick provision eager zeroed

What are the two GUI clients provided by VMware for use with vSphere? a. vSphere Controller and vSphere Web Client b. vSphere Web client and vSphere Client c. Direct Console User Interface (DCUI) and vSphere User Frontend d. visual CLI and vSphere Client

b. vSphere Web client and vSphere Client

What virtual network adapter type should you use if you need to support fault tolerance as well as record/replay for network traffic? a. vmxnet2 b. vmxnet3 c. e1000 d. vlance

b. vmxnet3

What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)? a. A SAN cannot make use of the iSCSI protocol. b. A typical NAS has better performance than a SAN. c. A SAN is more costly to implement. d. A SAN lacks the more advanced features of a NAS.

c. A SAN is more costly to implement.

Under what conditions might a virtual machine have a lock file? a. Lock files are used when a thin provisioned disk is configured. b. Lock files are used when an IDE controller is configured for a virtual machine. c. A lock file can exist when a virtual machine is stored on an NFS based data store. d. A lock file can exist when a raw device mapping is utilized.

c. A lock file can exist when a virtual machine is stored on an NFS based data store.

When creating a cluster of ESXi hosts, what option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts? a. Clustered Computing Service (CCS) b. Shared Process Threading (SPT) c. Distributed Resource Scheduler (DRS) d. Multi-Host Computing (MHC)

c. Distributed Resource Scheduler (DRS)

Smaller organizations can use which of the following vCenter Server's built in database to manage data center objects? a. Oracle DB b. MySQL Server c. PostgreSQL Server d. Microsoft SQL Server

c. PostgreSQL Server

What configuration file name would be assigned to the Raw Device Map (RDM) pointer file for a VM named Srv1? a. Srv1.rdm.vswp b. Srv1.vmdk.rdm c. Srv1.rdm.vmdk d. Srv1.vswp

c. Srv1.rdm.vmdk

What guest operating system information does not typically require modification when creating a template? a. The guest OS network settings b. The guest OS hostname c. The guest OS partition layout d. The guest OS license settings

c. The guest OS partition layout

What is a valid step that should be taken to make using iSCSI technology on a network more secure? a. The iSCSI traffic should be encrypted using CHAP. b. The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic. c. The iSCSI traffic should be isolated to a dedicated and separate network. d. The network should make use of hardware based iSCSI instead of software based iSCSI.

c. The iSCSI traffic should be isolated to a dedicated and separate network.

During installation, the vCenter Server appliance sets up a Single Sign On account using what username? a. manager@domain_name b. admin@domain_name c. administrator@domain_name d. root@domain_name

c. administrator@domain_name

What traffic shaping policy option determines the number of kilobits per second to allow across a port, averaged over time? a. average throughput b. average peak bandwidth c. average bandwidth d. burst size

c. average bandwidth

What type of migration involves a virtual machine that is powered off to a different shared data store or data store that is accessible by only one host? a. Enhanced vMotion migration b. Storage vMotion migration c. cold migration d. suspended migration

c. cold migration

What type of virtual switch exists only within a single vSphere hypervisor? a. isolated b. independent c. standard d. distributed

c. standard

What command can you use to add a comma separated list of users to an ESXi server using VCLI? a. viuser-cfg --add --type=user b. vicfg-adduser c. vicfg-user -u d. vicfg-user --adduser -l

c. vicfg-user -u

What statement regarding the use of distributed switches is accurate? a. A distributed switch can't make use of port groups. b. A distributed switch is not compatible with the use of vMotion. c. A distributed switch exists only within a single vSphere hypervisor, but is shared with multiple VMs. d. A distributed switch can be shared among multiple associated vSphere hosts, providing consistent network configuration.

d. A distributed switch can be shared among multiple associated vSphere hosts, providing consistent network configuration.

What is NOT one of the valid choices available for ESXi's virtual SCSI adapter? a. BusLogic Parallel b. LSI Logic Parallel c. LSI Logic SAS d. BusLogic SAS

d. BusLogic SAS

What are the two major console interfaces used to work with an ESXi host? a. vSphere Remote Console and vTerminal b. Remote Access Client (RAC) and vConsole c. vSphere ESXi Control Center and vSphere Shell Interface d. Direct Console User Interface (DCUI) and vCLI

d. Direct Console User Interface (DCUI) and vCLI

When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file? a. Nothing; vSphere templates are created using information in a sub directory of the VM. b. It is supplemented by a .vmtx file, as both files are required to define the VM. c. It is modified to include the settings required for creating the template. d. It is replaced by a .vmtx template configuration file.

d. It is replaced by a .vmtx template configuration file.

What kind of migration allows a powered-on virtual machine to be moved to a new data store? a. cold migration b. suspended migration c. Enhanced vMotion migrtion d. Storage vMotion migration

d. Storage vMotion migration

You are configuring a Linux based 64-bit virtual machine for use on a vSphere host. Based on this information, what will be the default network adapter type and why? a. The vlance adapter will be used, because it is the most compatible. b. The vmxnet3 adapter type will be used, because Linux has a built in driver. c. The default will be vmxnet to provide basic support for networking. d. The e1000 adapter type will be used, because it is the default for 64-bit guest operating systems.

d. The e1000 adapter type will be used, because it is the default for 64-bit guest operating systems.

What process is responsible for managing most of the operations on an ESXi host? a. vpxd b. vpxa c. kernd d. hostd

d. hostd

How many archive logs are maintained for a virtual machine at any one time? a. eight b. four c. two d. six

d. six

What statement regarding the vCenter Server hardware requirements is accurate? a. vCenter Server requires a minimum of 8 GB of RAM. b. vCenter Server requires two 100 Mbps Ethernet controllers c. vCenter Server requires 240 GB IDE drive space d. vCenter Server requires two CPU cores minimum.

d. vCenter Server requires two CPU cores minimum.


Ensembles d'études connexes

Chapter exam - florida laws and rules

View Set

50 Endocrine Problems (Hypo/Hyperthyroidism) - Lippincotts

View Set

Sets and Venn Diagrams: Assignment

View Set

types of people starting with the letter "A"

View Set

SS Ancient Greeks QUIZ Barno 2022

View Set

Chapter 7 important concepts and key terms

View Set

Chapter 16: Fluid, Electrolyte, and Acid-Base Balance

View Set

Rotations, Reflections, and Translations

View Set

INTRO TO PSYCHOLOGY FINAL EXAM STUDY GUIDE

View Set

Biology Lesson 2: Chemical Reactions

View Set