IST 198 Final Exam Review
True
By default, the network adapter in Hyper-V Server is configured to get an IP address via DHCP.
False
By default, use of virtual printers within VMware Workstation Player is enabled.
Challenge Handshake Authentication Protocol
CHAP (the acronym for __________________________________________) uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the iSCSI target when the host and target establish a connection.
secret
CHAP verification is based on a predefined private key, also called a CHAP _____________, that the initiator and target share.
desktop pools
Collections of virtual desktops that are managed by Horizon Connection Server.
routed network
Connects to the Edge gateway and provides virtual machines access to the external network.
Embedded Platform Services Controller
Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.
False
Creating Microsoft VDI complete virtual machines for each user will use considerably less storage space, and deploying a new application across an organization must be done to each individual virtual machine.
True
Creating automatic desktop full clone pools can save a lot of administrative time when you need to create many virtual desktops.
True
Dedicated cloud services are typically used by organizations that require the maximum security such as banks, government, hospitals, and legal firms.
True
With classic virtualization, the trap-and-emulate method was the most practical way to use virtualization.
(a) 0 (b) -1
With hardware-assisted virtualization , the guest OS runs in ring ____[a]____ and the hypervisor in ring ____[b]_____.
Containers
With the Microsoft Azure public cloud computing platform, RemoteApp and __________________ allows users to run individual applications on a wide variety of devices.
Content Delivery Network (CDN)
With the Microsoft Azure public cloud computing platform, what hosts Web objects such as images and text as well as software and documents across a global network of high bandwidth servers?
True
With the software iSCSI initiator, you can use iSCSI technology without purchasing specialized hardware.
serial
With vCenter Server, a license key is a(n) _____________ number that corresponds to a product.
True
You can run multiple virtual machines by starting additional instances of VMware Workstation Player as you did in the chapter activities.
True
You do not need to supply a product key when installing Hyper-V Server.
Fault tolerance
____[a]____ ____[b]____ (or FT) focuses mostly on preventing single point of failure by having redundant components that allow a system to continue working despite the failure of any one component.
Disaster Recovery
____[a]____ ____[b]____ as a Service (DRaaS) offers the ability to have a replicated data center in a remote location.
Binary
___________ translation is used to allow otherwise non-virtualizable x86 system calls to be trapped.
Recovery as a Service
A cloud-based disaster recovery service is known as what type of service?
Direct Console User Interface
A console interface that can be used to interact with an ESXi server host.
PC over IP
A display protocol designed to work efficiently with high definition graphics by compressing and sending pixels using similar means to HDTV.
True
By default, VMware Workstation Player suspends it's virtual machine when you exit the program
Raw Device Mapping
A file stored in a VMFS volume that acts as a proxy or go-between providing a physical storage device to virtual disk mapping.
False
A VMFS iSCSI based data store can't be dynamically expanded due to the nature of the VMFS file system structure.
UEM
A VMware Horizon component that can automate moving user profiles between desktop profiles across virtual desktop systems
role
A __________ provides a way to aggregate all individual privileges that are required to perform a higher-level task in vCenter Server
True
A benefit to application virtualization is the ability to tie applications to users versus the more traditional approach of installing applications into desktop images.
application virtualization
A form of packaging an application that isolates the application's files from the underlying operating system, preventing interference among applications.
cloud computing
A form of processing that provides on-demand services based on a virtualized set of resources that are independent from the physical location you are in.
HBA
A hardware based iSCSI initiator.
machine blueprint
A modeling specification used by vRealize for a virtual, cloud, or physical machine.
extent
A partition on a storage device (called a LUN in iSCSI terminology).
VMkernel
A software iSCSI initiator is VMware code built in to the ______________.
4,088
A standard vSphere virtual switch can have a maximum of ________ ports.
native
A type-1 hypervisor, also known as bare metal or _____________, runs directly on the host and doesn't require an operating system
Replication
A vSphere __________ appliance can copy virtual machines to another location, within or between clusters, and makes that copy available for recovery.
thin-provisioned
A way to make the most of your data store capacity by allowing for overallocation.
(a) full (b) incremental
A(n) ____[a]____ backup backs up all files and folders on the system being backed up, resetting all the archive bits to off. A(n) ____[b]____ backup backs up only new files or files that have changed (archive bit on) since the last backup; Once completed it's sets the archive bits to off.
differential
A(n) _______________ backup backs up only the files changed since the last full backup took place but leaves the archive bit set on.
(a) nested (b) extended
AMD and Intel have added features to their processors to help memory mapping overhead in the form of ___[a]___ paging tables (NPT) and ___[b]___ page tables (EPT)
(a) AMD-V (b) Intel VT
AMD's hardware virtualization is called AMD Virtualization (or ____[a]____). Intel's version is called Intel Virtualization Technology ( or ____[b]____). Note: use proper acronyms as presented in reading
A RARP request is sent to notify the network that the MAC is now on a new port.
After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port?
datastore
After configuring VDP, you can create backup jobs that consist of one or more virtual machines to be backed up to the VDC _____________.
Thick Provision Eager Zeroed
Allocates the space required for a virtual machine during creation. Data remaining on the physical device is zeroed out when the disk is created.
vCloud Director
Allows an organization to host their own cloud environments that may be used by internal or external consumers to build virtual data centers using the organization's local vSphere environment.
switch policies
Allows the administrator to set up rules and procedures to manage how virtual network resources are used.
Differencing Disks
Also called linked clones, which are generated from a parent machine but only contains a subset of the files needed to make it a unique user environment.
protection
An Operating System uses hierarchical protection domains, or ____________ rings, to control access to the CPU.
True
An RDM is recommended when a virtual machine must interact with data on the actual local disk on a SAN.
vlance
An emulated version of the AMD 79C970 PCnet32 NIC
isolated network
An internal only network that does not connect to the network, similar to a host only network.
Raw Device Mapping
An option in VMware server virtualization environment that allows a guest operating system to store data directly on a the host computer's storage (local or SAN):
GUI
As Hyper-V Server doesn't have a ______________, you must perform all configurations through the command prompt window.
trunk port
As an example, this is used by a physical switch to pass packets from multiple VLANs to a host using VLAN tags.
access control system
Authorization to perform tasks in vCenter Server is governed by a(n) ________________________ that allows the vCenter Server administrator to specify in detail which users or groups can perform which tasks on which objects
False (Azure Site Recovery offers three different modes of failover: Test, Planned, and Unplanned.)
Azure Site Recovery offers three different modes of failover: Test, Maintenance, and Unplanned.
cloud
Azure Site Recovery provides similar functionality as Hyper-V replicas but eliminates the need for a second on-premises data center by using the _______.
Stacks
Azure _____________ combines the best of the Private Cloud and Azure, allowing corporations to run most of Azure's cloud services within their own private datacenters.
True
Because instant clones are created in memory, they do not require any disk storage.
True
Both VMware vCloud and Microsoft Azure are generally classified as IaaS cloud platforms.
True
Both vSphere and Hyper-V allow for virtual switches that can provide alternate paths using multiple network adapters.
Virtual Machines
By default (install), VMware Workstation Player will use the Documents\_________________________ folder to store virtual machine files.
static discover
Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.
administrator@domain_name
During installation, the vCenter Server appliance sets up a Single Sign On account using what username?
True
ESXi host roles are confgured simialr to vCenter Server roles.
gateway
Each VMkernel port must be configured with its own IP address and _____________.
Offline Data Transfer service
Facilitates the transfer of large amounts of data securely from vSphere datacenters to vCloud air.
True
Failover Clustering is built into Windows Server 2016 (and newer) itself and allows multiple servers to be grouped, or clustered, together into different nodes.
3
For CPU access, ring ___________ is where all user applications (such as web browsers and word processing software) run.
(a) target (b) IP
For software based iSCSI adapters, ESXi supports CHAP on a per-____[a]____ level. After the connection is established, the initiator transmits SCSI commands over the ___[b]___ network to the target service.
True
Hardware-assisted virtualization eliminates the need for translation and the extra overhead it entails
They are authenticated against Microsoft Active Directory.
How are users authenticated using the connection server for VMware Horizon Virtual Desktop Infrastructure?
A combination of both routed and isolated networks can be used to establish a DMZ.
How can you create a DMZ-like zone within a virtual data center using vCloud Air?
6
How many archive logs are maintained for a VSphere hosted virtual machine at any one time?
True
Hyper-V Replicas create live copies of running virtual machines on secondary Hyper-V servers.
capacity
If a vSphere Virtual Machine thin disk needs more space, it can expand to the maximum ________________ allocated to it
synchronized
If an organization has two or more virtual data centers, they can use vSphere Replication to keep virtual machines in both locations _____________.
False
If the peak bandwidth parameter is set, a port might gain a burst bonus if it does not use all its allocated bandwidth.
False
If vCenter Server is installed on a Windows-based machine, that install must be an Active Directory server.
hostd
If you are using the vSphere Client to communicate directly with an ESXi host, communications go directly through which process?
mobile
Implementing BYOD often requires additional network and computer resources to run the virtual machines needed to support _________ devices.
False
Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller.
On a NAS or SAN
In a VDI environment, where are virtual desktop VMs typically stored?
template
In a manual full clone pool, the virtual desktops VMs are created from a _____________ and then configured and added to the pool individually.
(a) snapshots (b) switches
In addition to backing up ____[a]____, both VMware and Microsoft provide specialized backup services that allow you to back up virtual machines along with other objects such as ____[b]____ and hypervisor configurations.
(a) 1 (b) 0
In full virtualization, the guest OS runs in ring ____[a]____ and the hypervisor in ring ____[b]_____.
False
In order to maintain a responsive and low risk environment for virtual machines, a host's CPU and memory should remain below 70-80% utilization.
True
In paravirtualization, the guest OS is modified to work with the hypervisor.
hardware
In paravirtualization, the guest OS makes hypercalls directly to the host __________.
System audit Mode
In the Sysprep utility, what option allows applications and drivers to be installed and is used to test the installation?
True
In the case of a failed VDP appliance, the datastore from the failed VDP can be reattached to another copy of VDP.
True
In vCenter Server, a role is a collection of privileges
video
Input/output MMU allows devices such as ________ cards, Ethernet adapters, and hard drive controllers direct access to memory to increase performance.
agent software
Installed on each virtual desktop and communicates to a client running on a user's computer.
non-persistent
Instant clones are considered _________________ as they are deleted from memory after the user ends their session.
high availability
Keeping services available and online 24/7 has become a major requirement for many organizations The term ____[a]____ ____[b]____ describes a service's capability to continue despite the loss of a system or site.
Compute
Match the Openstack component categories with their descriptions: Define the standards for the Hypervisor and associated modules need to run virtual machines
Control
Match the Openstack component categories with their descriptions: Responsible for managing the configuration and authorization in the OpenStack environment
Network
Match the Openstack component categories with their descriptions: Used to connect internal components as well as provide gateways to external networks
Storage
Match the Openstack component categories with their descriptions: Used to store virtual machines, images, databases, and message files
Manage
Match the VMware Workstation Player > Player menu options to their functions: - change virtual machine settings - display message logs - install VMware tools
Removable Devices
Match the VMware Workstation Player > Player menu options to their functions: - connect a host USB device
File
Match the VMware Workstation Player > Player menu options to their functions: - create a new virtual machine - open an existing virtual machine - download a virtual appliance - change Preference options
Unity
Match the VMware Workstation Player > Player menu options to their functions: - run virtual machine applications on the host computer - requires VMware Tools on the guest OS
Help
Match the VMware Workstation Player > Player menu options to their functions: - search for topics based on key words
Send Ctrl+Alt+Del
Match the VMware Workstation Player > Player menu options to their functions: - send the Ctrl+Alt+Del key sequence to the currently running guest OS
Power
Match the VMware Workstation Player > Player menu options to their functions: - turn on or shutdown a Guest - suspend a Guest - restart a Guest
Full Screen
Match the VMware Workstation Player > Player menu options to their functions: - use the workstation's full screen
1. Tiny 2. Tiny 3. Small 4. Small 5. Medium 6. Medium 7. Large 8. Large
Match the VMware vCenter Server Appliance 6.0 environments to their corresponding specifications: 1. up to 10 hosts 2. up to 100 Virtual Machines 3. up to 100 hosts 4. up to 1,000 Virtual Machines 5. up to 400 hosts 6. up to 4,000 Virtual Machines 7. up to 1,000 hosts 8. up to 10,000 Virtual Machines
Connects users to virtual machines
Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Connection Broker
Enables secure access to virtual machines over the Internet
Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Gateway
Manages the licenses authorizing use of operating systems on virtual desktops
Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Licensing
Manages the Hyper-V servers that will be hosting the virtual machines
Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Virtualization Host
Allows users to easily access their virtual machines from a browser
Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Web Access
(a) master (b) profile
Microsoft VDI Virtual machines in a pooled virtual desktop collection all share the same _____[a]_____ image. Any changes made to the virtual machine are reverted when the user logs off. Only the user _____[b]_____ is stored.
False
Microsoft Virtual Machine Manager can provide support for only a single private cloud.
True
Microsoft offers Hyper-V Server at no cost.
x86
Modern processors from Intel and AMD have support for hardware virtualization, which essentially gives trap-and-emulate capabilities of classic virtualization to the _________ platform.
open
Modifying an OS to support paravirtualization is easy on an ____________ source OS, such as Linux.
False
NIC teaming policies are set for an entire standard switch, and cannot be changed at the port group level.
True
NIC teaming policies enable you to determine how network traffic is distributed between adapters and how to reroute traffic in the event of an adapter failure.
load-balancing
NIC teaming policies include ________________________ and failover settings.
1. Reject 2. Accept 3. Accept
Network security policies allow the administrator to set the following security exceptions: Match each security exception to it's default value: 1. Promiscuous Mode 2. MAC Address Changes 3. Forged Transmits
True
Network switch policies can be defined for a entire virtual switch, individual port, or port groups.
ClarityUI
Newer versions (7.5 and 8.x) of vRealize have switched to a ________________ dashboard.
False
No vCloud account is required in order to set up a vCloud virtual data center (VDC), although it is preferred.
dynamic discovery
Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.
private cloud
Often used by large organizations that are required to store their data within on-premise data centers, this provides the ability for an organization to service consumers and users with on-demand IT services and resources.
1. Obtain a vCloud Air account 2. Create a virtual data center along with any necessary virtual machines 3. Install vConnector in the existing vSphere environment 4. Connect the local vSphere data center to the vCloud virtual data center
Properly order the four steps involved in extending a data center with vCloud Air:
connection broker
Provides a way to connect thin clients to their assigned virtual desktops based on username and then manages and tracks these connections in a database for auditing and control purposes.
edge gateway
Provides routing and firewall services to connect internal virtual networks to the External or public network.
The settings on the port will have priority, because the policy is overridden at the port level.
Scenario: A security policy has been applied to an individual port on a virtual switch. The switch itself has a conflicting policy configured. What setting has priority?
The MAC address changes and forged transmits policies should be set to "Reject".
Scenario: A virtual machine providing services for your network was recently hacked. The virtual machine was used to spoof MAC addresses on your network to target other systems. What policies could you set to prevent this from reoccurring?
The "Assign uplink" icon should be selected after the NAT network adapter is added.
Scenario: You are adding a new ESXi host and configuring a NAT adapter While adding a you receive a warning that one or more hosts have no assigned physical network adapters What should be done?
Your ISP or router is blocking the use of port 445 outside your local network.
Scenario: You are attempting to map a drive letter to a Microsoft Azure File Storage cloud share, but the attempt fails with errors. What is most likely the issue, given the problems presented?
cold migration
Scenario: You are attempting to migrate a virtual machine to a different host The new host has an Intel processor The old host has an AMD processor What type of migration must be performed?
The RD Web Access service is using a self-signed certificate.
Scenario: You are attempting to open the RD Web Access page You receive a security warning that the web site is not trusted. What is most likely the cause?
A network security policy is preventing the use of a promiscuous mode interface.
Scenario: You are attempting to utilize a packet capturing software in your studies of a network's traffic. However, your virtual machine running on vSphere is unable to put the network adapter in promiscuous mode. What is the most likely reason for the failure?
The organizational unit the VMs will be placed in.
Scenario: You are configuring Microsoft RDS and have come to the Active Directory configuration page. Besides being able to select the domain for deployment, what other option should you configure on this screen?
The e1000 adapter type will be used, because it is the default for 64-bit guest operating systems.
Scenario: You are configuring a Linux based 64-bit virtual machine for use on a vSphere host. Based on this information, what will be the default network adapter type and why?
%windir%\system32\sysprep\sysprep.exe
Scenario: You are preparing a Windows 10 virtual machine template and need to prepare the VM.. Where can you find the Sysprep utility?
traffic shaping policy
Scenario: You are trying to support a VOIP application on a virtual machine, and need to prioritize VOIP traffic. What kind of virtual switch policy should you use?
The adapter has been manually configured to a speed of 100 Mb, duplex operation.
Scenario: You are using a gigabit Ethernet adapter (vmnic1) on an ESXi host You have found that the status screen displays the adapter as being connected at 100 Mb, full duplex. You have verified that the switch your server connects to has 1 Gbps capable ports. What is most likely the problem?
Machine Learning
Scenario: You have been tasked with deploying a cloud based Microsoft Azure service that creates predictive analytics models. What Azure service should you use?
The Edge Gateway is blocking all incoming ports.
Scenario: You have deployed a Virtual Private Cloud service and configured a routed network for your VM. After deploying you find that you are unable to access any ports assigned to services on the VM. What is most likely the issue?
The static target was added via dynamic discovery, and a rescan operation has re-added it.
Scenario: You remove a static software-based iSCSI target. You then discover hours later that the target has been returned to the list of targets. What is the most likely cause?
Enhanced vMotion migration
Scenario: You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use?
VMware ESX Citrix XenServer Microsoft Hyper-V
Select the type-1 hypervisors listed below:
PostgreSQL Server
Smaller organizations can use which of the following vCenter Server's built-in database to manage data center objects?
software iSCSI initiator
Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.
True
Some VMware license keys can be split by applying them to multiple assets.
Thick Provision Lazy Zeroed
Space required for a virtual disk is allocated during creation, but data remaining on the physical device is not erased during creation, it is zeroed out over time.
Remote Desktop Services
The Microsoft technology, formerly known as Terminal Services, that now encompasses Virtual Desktop Architecture and Session Desktops.
lossless
The PCoIP protocol is a __________________ protocol by default, providing a display without losing any definition or quality.
Enterprise Integration
The Service Bus and StorSimple services on Microsoft Azure fall under what Azure cloud service category?
Out-of-Box Experience
The System _________________________ (OOBE) option in SysPrep allows for tasks such as creating user accounts and naming the computer like a new PC installation.
True
The VMware connector allows administrators to migrate computing resources across vSphere and vCloud environments.
False
The VMware vCloud Connector is a paid add-on tool help organizations to create fully functional hybrid cloud environments.
True
The Virtual Network Editor is not included in the free VMware Workstation Player package.
tenancy
The Virtual Private Cloud service is a multi-______________ service in that multiple organizations will share the same hardware that is logically divided into separate virtual data centers.
Horizon Connection Server
The central component of the Horizon Virtual Desktop Infrastructure.
RDS
The combination of Session Virtualization and VDI
True
The dedicated cloud account is more expensive than the Virtual Private Cloud account.
False
The e1000 network adapter is an emulated version of the Intel 82574L Gigabit Ethernet NIC.
True
The kernel of an OS runs in protection ring 0.
External Platform Services Controller
The name for when the platform services controller is installed on a separate server from the vCenter Server.
vmxnet3
The next generation of a paravirtualized NIC, designed for performance and advanced features such as fault tolerance.
portlets
The original vRealize user dashboard contained _______________ (also called frames) that show a variety of information
overallocation
The process of assigning more disk space to virtual disks that you have space available on a VMFS data store.
(a) agent (b) administrative (c) vCenter
The roles of the Horizon Connection Server include the following: Manage connections between Horizon clients and Horizon-managed desktops running the Horizon ____[a]____ software. Authenticate user connection requests and provide access to assigned desktops. Host the Horizon ____[b]____ console. Work with VMware ____[c]____ to manage, deploy, and maintain virtual desktops.
False
The vCenter Server Linux appliance has a built-in MySQL database that can be used instead of a Microsoft SQL server.
Web Client, Inventory database service, Syslog services, Auto Deploy service
The vCenter services include the vCenter Server itself and what other services?
(a) multiqueue (b) offloads (c) interrupt
The vmxnet3 adapter offers all the features available in vmxnet2 and adds several features, like _____[a]_____ support (called Receive-Side Scaling in Windows), IPv6 _____[b]_____, and MSI/MSI-X _____[c]_____ delivery.
True
There are two major types of pools that can be created by VMware Horizon: full clone pools and linked-clone pools.
capacity
Thin provisioning can be configured to provide alarms and reports to track current usage of storage _______________.
deduplication
Thin provisioning is often used with storage array ___________________ to improve storage use and to backup virtual machines.
e1000
This network adapter is an emulated version of the Intel 82545EM Gigabit Ethernet NIC, with drivers available in most newer guest operating systems, including Windows XP and later and Linux versions 2.4.19 and later.
Preferences
To change a VMware Workstation Player virtual machine's exit behavior and configure settings for online updates, click the ________________ option from the File menu
sconfig
To reopen the Hyper-V Server > Server Configuration window, from command prompt type the ______________ command
False (Type-2 hypervisors are user applications that run on top of another operating system, such as Windows or Linux)
Type-1 hypervisors are user applications that run on top of another operating system, such as Windows or Linux
False
USB devices can be connected directly to an ESXi host computer.
A lock file can exist when a virtual machine is stored on an NFS based data store.
Under what conditions might a virtual machine have a lock file?
Catalog
Under what tab in the original vRealize Automation dashboard will a user be able to deploy services that they have been entitled to?
Requests
Under what tab in the original vRealize Automation dashboard will a user review service histories in vRealize Automation?
6
Up to _______________ additional replica connection servers can be installed in a single Horizon VDI environment.
personal virtual desktop collection
Used by VDI to assign individual virtual machines to users that serve as their own private, persistent desktops.
Thin Provision
Uses only as much data store space as the disk initially needs.
False
Using ANS vCloud Air provides a high capacity SSL VPN that can be used by individual devices such as laptops and mobile phones to connect securely into a vCloud Air environment using SSH certificates.
(a) export (b) encrypted
Using ODT, you can _____[a]_____ your data to an external storage device that is provided by a vCloud Air operator. The data is then _____[b]_____ and stored on the external storage device, which you then ship back to the operator.
True
Using VSS within VDP allows applications running on virtual servers to quiesce data before the backup. This is most commonly done when backing up Microsoft Exchange email servers.
(a) on-premises (b) portal
Using the vCloud Connector, organizations can connect and manage virtual machines in their ____[a]____ datacenters with a VMware-backed public cloud using a single vCloud Connector ____[b]____.
VMware vRealize Automation
What VMware vCloud suite component provides self service and policy based infrastructure, and provides on-demand cloud services to consumers through the use of catalogs?
VMware vRealize Operations
What VMware vCloud suite component provides tracking VM usage statistics for managing resource allocation?
virtual machine VMkernel uplink
What are the different types of ports that exist on a virtual switch?
(a) hybrid (b) applications (c) capacity
Using vCloud Air to extend a data center has several advantages: Extend Existing Applications: A major advantage of implementing a _____[a]_____ cloud is migrating applications from your existing data center to vCloud Air without having to make any major changes in the application or data center to provide consistent security and accessibility. Test & Development: Another important advantage of extending the data center using a hybrid cloud is utilizing cloud capacity for development and testing of new _____[b]_____. Web & Mobile Applications: Using a hybrid cloud provides the ability to deliver mobile Web applications over vCloud Air while still providing limited access to your on-premises data center. Cloud-Hosted Desktops: Delivery of desktops and hosted apps as a cloud service can provide end users on any device, anywhere, with needed _____[c]_____ without compromising the dedicated resources of your local data center.
True
VDI agent software communicates through the connection broker.
Data protection
VDP uses the vSphere Storage APIs for ____[a]____ ____[b]____ (VADP) in order to back up other running virtual machines without requiring special backup software within the guests being backed up.
protected
VMware FT eliminates this downtime by keeping a second copy of __________ VMs running on other hosts in the cluster, allowing VMware FT to instantly move VMs to a new host.
True
VMware Virtual appliances have the benefit of being fully configured for a specific application.
True
VMware Workstation 12 Player can be a standalone product that can be downloaded and installed on most Windows and Linux systems.
True
VMware Workstation Player allows use of shared folders from the host computer (with proper configuration).
True
VMware Workstation Player is included with VMware Workstation.
False
VMware Workstation Player is limited to running two guest VMs in each Player instance.
False
VMware Workstation Player supports snapshots and cloning.
True
VMware Workstation Player virtual machines can communicate with each other through their virtual network adapters.
User Environment Management
VMware provides a ___________________________________ component that can automate the setup of roaming user profiles across virtual desktop systems.
True
VMware vSphere 6 provides support for USB 3.0 devices in virtual machines.
pooled virtual
VMware's instant clone desktop feature is known as _________________ desktops in Hyper-V. (two word answer)
True
Virtual Private Clouds are much more economical than dedicated cloud services.
8
Virtual machines running on a free vSphere hypervisor can have up to _______ virtual CPUs.
128
Virtual machines running on a licensed vSphere hypervisor can have up to _______ virtual CPUs.
RA-GRS
What Azure File Storage replication strategy supports replication across multiple facilities as well as the ability to read data from primary or secondary locations?
Digital Rights Management
What Microsoft Azure cloud service does not fall under the Security and Identity category?
Visual Studio Application Insights
What Microsoft Azure cloud service provides developers with the ability to track application crashes and usage?
RD connection broker
What Microsoft VDI component is responsible for balancing performance by choosing virtual machines from different servers when possible?
Pay-as-you-go
What NIST defined cloud characteristic allows consumers to pay only for the resources they use?
Elasticity
What NIST defined cloud characteristic allows resources to be managed by the consumer and quickly scaled out to provide more capability or quickly scaled in to release unneeded capacity?
Broad network access
What NIST defined cloud characteristic describes access to services over the network using a Web browser and standard interfaces from any location with a variety of devices including desktop, laptop, and tablet computers?
On-demand self-service
What NIST defined cloud characteristic describes the ability for consumers to quickly provision virtual machines with the hardware and software resources they need without waiting for outside assistance?
Resource pooling
What NIST defined cloud characteristic describes the ability to group resources and make them available to users on demand in a shared, multi-tenant fashion?
Reliability and redundancy
What NIST defined cloud characteristic provides the capability for redundancy and fault tolerance through the use of virtual machines, as well as load balancing and disaster recovery?
Nova
What OpenStack component serves as the standard hypervisor that interacts with other modules that make up a cloud environment?
non-persistent desktops
What VDI solution makes it possible for a school environment to provide virtual desktops that are returned to their original state when they are signed out?
instant clone
What VMware Horizon feature allows virtual desktop clones to be created on the fly from a running parent VM?
VMware vRealize Business
What VMware vCloud suite component provides automated costing, usage metering, and service pricing of virtualized infrastructure for vSphere environments?
VMware vRealize Operations
What VMware vCloud suite component provides performance, capacity, and configuration management for vSphere environments?
True
With a Microsoft VDI personal virtual desktop collection, users can install their own applications and have full administrative access.
1. The initiator finds one or more targets and establishes a connection 2. A target presents LUNs to the initiator 4. The initiator sends SCSI commands to a target
What are the steps undertaken by an initiator in order to connect to an iSCSI target (in order)?
vSphere Web client and vSphere Client
What are the two GUI clients provided by VMware for use with vSphere?
RemoteApp and App-V
What are the two application virtualization packages available through Microsoft?
ThinApp and Vapp
What are the two application virtualization packages available through VMware?
A connection can be made over the public Internet or an IPSec VPN can be utilized.
What are the two different options available for connecting vCloud Air and your vSphere data center?
DCUI and vCLI
What are the two major console interfaces used to work with an ESXi host?
vicfg-user -u
What command can you use to add a comma separated list of users to an ESXi server using VCLI?
RD session host
What component of RDS provides server desktops as Terminal Services did rather than virtual machines?
Server2019.rdm.vmdk
What configuration file name would be assigned to the RDM pointer file for a VM named Server2019?
MSSQL
What database is not available as a choice for use with OpenStack?
It provides hybrid storage, combining cloud storage for less frequently accessed data and local storage for high performance needs.
What functionality does the StorSimple Azure cloud service provide?
The guest OS partition layout
What guest operating system information does not typically require modification when creating a template?
No users are able to log into ESXi hosts, they must authenticate with vCenter Server.
What happens when ESXi hosts are put into lockdown mode?
BusMQ
What is NOT one of the popular message buses utilized as a storage component for OpenStack?
BusLogic SAS
What is NOT one of the valid choices available for ESXi's virtual SCSI adapter?
A SAN is more costly to implement.
What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)?
The iSCSI traffic should be isolated to a dedicated and separate network.
What is a valid step that should be taken to make using iSCSI technology on a network more secure?
Virtual machine image management
What is not one of the items defined by the control components of OpenStack?
License service, VMware Certificate Authority, Lookup service, vCenter Single Sign On
What is part of the VMware platform services component of vCenter Server?
You are creating a small group of customized desktops.
What is the best use case for deploying a manual full clone pool?
2 TB
What is the default amount of storage that is provided when using the vCloud Air Virtual Private Cloud subscription?
The connection server
What is the major component that is required in order to implement a basic VMware Horizon Virtual Desktop Infrastructure?
2000
What is the maximum number of clients that a Horizon connection server can handle?
32
What is the maximum number of extents that can be added to any VMFS data store?
4 GB RAM
What is the minimum requirement for RAM required in order to run the Horizon Connection Server?
Glance
What is the name of the virtual machine image management component used by OpenStack?
Windows Server 2012
What is the oldest recommended version of Windows Server that should be used to host the Horizon Connection Server?
Advanced Networking Services
What is the vCloud Air equivalent of the VMware NSX software defined networking environment?
A three-way handshake and private keys
What is used by CHAP to verify the identity of a host?
Storage vMotion migration
What kind of migration allows a powered-on virtual machine to be moved to a new data store?
RD Gateway
What optional Microsoft VDI component provides secure internet access to virtual machines without requiring a VPN?
hostd
What process is responsible for managing most of the operations on an ESXi host?
It is the OpenStack frontend to a set of agents that manages Networking as a Service using the Software Defined Networking infrastructure.
What role does the Neutron component of OpenStack serve?
A network monitoring application such as an intrusion detection system (IDS)
What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support?
Virtual desktop systems must be domain members.
What statement is accurate regarding the use of virtual desktops with VMware Horizon 7?
A minimum of 40 GB of hard disk space must be available.
What statement regarding the Horizon Composer (verions 7.12) requirements is accurate?
VMware vCenter Server Appliance: requires two CPU cores minimum.
What statement regarding the VMware vCenter Server Appliance 6.0 hardware requirements is accurate?
RDS cannot be installed onto a Domain Controller.
What statement regarding the deployment of Microsoft RDS is accurate?
Desktop pools can be moved between hosts based on host availability and performance
What statement regarding the use of desktop pools is accurate?
A distributed switch can be shared among multiple associated vSphere hosts, providing consistent network configuration.
What statement regarding the use of distributed switches is accurate?
A VMFS data store can be expanded as long as there is free space available in the extent.
What statement regarding the use of iSCSI extents is accurate?
The root user is still able to log in via the DCUI console.
What statement regarding the use of lockdown mode is accurate?
Security Server can be installed on a server that is independent of Active Directory.
What statement regarding the use of the VMware Horizon Security Server is accurate?
The vpxa process serves as an intermediary between the vpxd process and the hostd process.
What statement regarding the vpxa process is accurate?
object
What term is used to describe an entity upon which actions are performed in vCenter Server?
privilege
What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server?
root object
What term is used to describe the top most object in the vCenter Server inventory?
peak bandwidth
What traffic shaping policy option determines the max number of kilobits per second to allow across a port when it is sending a burst of traffic?
burst size
What traffic shaping policy option determines the max number of kilobits to allow in a burst?
average bandwidth
What traffic shaping policy option determines the number of kilobits per second to allow across a port, averaged over time?
Virtual Desktop Access (VDA) and Software Assurance (SA)
What two items are managed by the use of the RD Licensing VDI component?
cold migration
What type of migration involves a virtual machine that is powered off to a different shared data store or data store that is accessible by only one host?
standard
What type of virtual switch exists only within a single vSphere hypervisor?
thin provision
What virtual disk file type can expand to the maximum capacity allocated to it?
thick provision eager zeroed
What virtual disk file type can take advantage of VMware vSphere Fault Tolerance?
thick provision eager zeroed
What virtual disk file type takes the longest to create?
VM_name.vmss
What virtual machine configuration file holds the virtual machine's snapshot state information?
vmxnet3
What virtual network adapter type should you use if you need to support fault tolerance as well as record/replay for network traffic?
vMotion
When HA is enabled in a cluster, if an ESXi host in the cluster fails or is brought down for maintenance, the virtual machines on that host are moved to another host in the cluster using _____________.
True
When a virtual machine attempts to make a system call to the kernel, a hardware fault or error is generated in the CPU.
It is replaced by a .vmtx template configuration file.
When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file?
Multiple network adapters should be used in each host, and should be attached to separate physical switches.
When configuring a VDI environment, how can network redundancy be accomplished?
Distributed Resource Scheduler (DRS)
When creating a cluster of ESXi hosts: What option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts?
generator
When managing Disaster Recovery with Virtualization, many organizations have a __________________ as a backup power system to allow them to continue operations for some limited time in the event of a major power failure.
--vihost
When running the vmkfstools command with the --server option pointing to a vCenter Server system, what option should be used to select the proper ESXi host to run the command against?
False
When updating software for linked clones, all linked clones must be manually updated, including the parent.
adapter
When using hardware-based HBA, ESXi supports CHAP authentication at the _____________ level
vCenter Server
When using the Horizon virtual desktop system, what serves as the central management component for administrating the virtual data center?
vpxa
When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the ___________ process.
translation lookaside buffer
With CPU MMUs, a built-in cache called the ___[a]___ ___[b]___ ___[c]___ is used to increase speed by storing frequently accessed memory locations.
query
With Hyper-V Server, to see a list of all active drivers, enter the following command: sc _________ type= driver | more
remotely
With Hyper-V Server, you must manage virtual machines ___________ using Hyper-V Manager or Microsoft Virtual Machine Manager.
power
With Microsoft Replica Server, you can perform a planned failover when you need to perform routine server maintenance on your primary server, or anticipate a loss of _________ such as from scheduled utility work or incoming bad weather.
Change
With VMware Workstation Player, you can use the _______ Settings button located under the Devices section of the Preferences window to allow guest virtual machines to access the host printers.
Shadow
______________ page tables map memory addresses between guest OS virtual memory and host physical memory directly.
asset
license keys that are managed and monitored from vCenter Server using the Web Client. License information can be viewed by product, license key, or ____________.
(a) Inventory (b) Auto Deploy
vCenter services include the vCenter Server itself, the Web Client, an _____[a]_____ database service, the _____[b]_____ service, and Syslog services.
True
virtualization software must be able to handle system calls made by guest OSs running on virtual machines.
memory management units
x86 CPUs use internal ___[a]___ ___[b]___ ___[c]___ to build page tables that translate virtual memory addresses to locations in physical memory.