Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What two versions of the Microsoft .NET Framework must be installed in order for you to make use of VMM? ◈ .NET 2.0 and .NET 3.0 ◈ .NET 3.5 and .NET 4.6 ◈ .NET 4.0 and .NET 4.5 ◈ .NET 3.5 and .NET 4.0

.NET 𝟑.𝟓 and .NET 𝟒.𝟔

What is the maximum number of vCPUs supported by the 𝐟𝐮𝐥𝐥𝐲 𝐥𝐢𝐜𝐞𝐧𝐬𝐞𝐝 version of the vSphere hypervisor? ◈ 8 vCPUs ◈ 16 vCPUs ◈ 64 vCPUs ◈ 128 vCPUs

128 vCPUs

What is the maximum number of extents that can be added to any VMFS data store? ◈ 64 ◈ 16 ◈ 32 ◈ 8

32

What port should 𝐧𝐨𝐭 be assigned to any feature when installing VMM? ◈ 5986 ◈ 8631 ◈ 11245 ◈ 15892

5986

While using vSphere for 𝐟𝐫𝐞𝐞, you are limited to how many virtual CPUs? ◈ 8 ◈ 32 ◈ 128 ◈ 1

8

What is the default port utilized by the VMM Management Server to 𝐚𝐥𝐥𝐨𝐰 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐨𝐧𝐬 by the VMM Console? ◈ 8100 ◈ 15692 ◈ 5986 ◈ 10000

8100

After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port? ◈ The MAC address aging timer must expire, after which a learning period occurs, and the MAC is registered on the new port. ◈ A multicast packet is sent to notify the network of the change. ◈ A RARP request is sent to notify the network that the MAC is now on a new port. ◈ The host forces the network switch to clear it's MAC address table so that the MAC is flooded out all ports.

A RARP request is sent to notify the network that the MAC is now on a new port.

What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)? ◈ A SAN cannot make use of the iSCSI protocol. ◈ A typical NAS has better performance than a SAN. ◈ A SAN is more costly to implement. ◈ A SAN lacks the more advanced features of a NAS.

A SAN is 𝐦𝐨𝐫𝐞 𝐜𝐨𝐬𝐭𝐥𝐲 𝐭𝐨 𝐢𝐦𝐩𝐞𝐦𝐞𝐧𝐭.

What statement regarding the use of distributed switches is accurate? ◈ A distributed switch can't make use of port groups. ◈ A distributed switch can be shared among multiple associated vSphere hosts, providing consistent network configuration. ◈ A distributed switch exists only within a single vSphere hypervisor, but is shared with multiple VMs. ◈ A distributed switch is not compatible with the use of vMotion.

A distributed switch 𝐜𝐚𝐧 𝐛𝐞 𝐬𝐡𝐚𝐫𝐞𝐝 𝐚𝐦𝐨𝐧𝐠 𝐦𝐮𝐥𝐭𝐢𝐩𝐥𝐞 𝐚𝐬𝐬𝐨𝐜𝐢𝐚𝐭𝐞𝐝 vSphere hosts, providing consistent network configuration.

What statement regarding the use of a generation two virtual machine is accurate? ◈ A generation two virtual machine does not support the addition of an IDE controller. ◈ A generation two virtual machine simulates the newer style EFI firmware. ◈ Generation two virtual machines support the use of legacy network adapters. ◈ A generation two virtual machine will not support a SCSI based DVD drive.

A generation two virtual machine simulates the newer style EFI firmware.

Under what conditions might a virtual machine have a lock file? ◈ A lock file can exist when a virtual machine is stored on an NFS based data store. ◈ A lock file can exist when a raw device mapping is utilized. ◈ Lock files are used when an IDE controller is configured for a virtual machine. ◈ Lock files are used when a thin provisioned disk is configured.

A lock file can exist when a virtual machine is stored on an NFS based data store.

What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support? ◈ A web server with multiple virtual host configurations. ◈ A network monitoring application such as an intrusion detection system (IDS). ◈ An e-mail server that utilizes load balancing features. ◈ A clustered application that shares its IP address with other instances.

A network monitoring application such as an intrusion detection system (IDS).

You are attempting to utilize a packet capturing software in your studies of a network's traffic, however, your virtual machine running on vSphere is unable to put the network adapter in promiscuous mode. What is the most likely reason for the failure? ◈ The virtual machine hardware compatibility mode is limiting the virtual machine to legacy adapters. ◈ vSphere is connected to the network via a switch, and therefore cannot change to promiscuous mode. ◈ vSphere does not support the use of promiscuous mode devices. ◈ A network security policy is preventing the use of a promiscuous mode interface.

A network security policy is preventing the use of a promiscuous mode interface.

What statement accurately describes a perimeter network location? ◈ Perimeter networks are networks that have automatically installed the VMM Local Agent via Active Directory. ◈ A perimeter network is a network that is not part of Active Directory. ◈ A perimeter network is a network in a different area of the Active Directory forest. ◈ Perimeter networks are networks that are isolated in scope and exist in a separate forest using VMM.

A perimeter network is a network that is 𝐧𝐨𝐭 part of Active Directory.

What is used by CHAP to verify the identity of a host? ◈ A three way handshake and private keys ◈ host certificates ◈ Pre-approved host list ◈ network MAC address database

A three way handshake and private keys

You are about to install a guest OS from a DVD disc. What must you do in order to install the guest OS in a generation two virtual machine? ◈ An ISO file must be created from the DVD in order to use it with a generation two virtual machine. ◈ Nothing, the default configuration for a second generation virtual machine is to use the physical DVD drive as the source for installation. ◈ Map the host's DVD drive to a DVD drive in the virtual machine. ◈ An IDE controller must be added to the virtual machine, and a DVD player attached to it.

An 𝐈𝐒𝐎 𝐟𝐢𝐥𝐞 must be created from the DVD in order to use it with a generation two virtual machine.

You are configuring a backup program for a server that hosts Hyper-V based virtual machines. One of your required locations to back up is the folder containing the virtual machine configuration files. Where are these located? ◈ C:\Users\Public\AppData\Microsoft\Windows\Hyper-V ◈ C:\Users\Public\Documents\Windows\Hyper-V ◈ C:\Users\Public\Documents\Hyper-V ◈ C:\ProgramData\Microsoft\Windows\Hyper-V

C:\𝐏𝐫𝐨𝐠𝐫𝐚𝐦𝐃𝐚𝐭𝐚\Microsoft\Windows\Hyper-V

How do virtual COM ports communicate with the host machine on Hyper-V? ◈ The serial ports must utilize a special Microsoft USB driver that passes the traffic on the host's USB bus. ◈ Communication occurs through a setting in the Windows registry. ◈ COM ports communicate via special TCP/IP enabled network adapters on the guest and the host. ◈ Communication is done through the use of a named pipe.

Communication is done through the use of a 𝐧𝐚𝐦𝐞𝐝 𝐩𝐢𝐩𝐞.

Under the Fabric ribbon 𝐰𝐢𝐭𝐡𝐢𝐧 the Storage node, where can you create a policy that assigns storage classifications to actual performance metrics, such as maximum bandwidth and IOPS? ◈ Create Storage Classification ◈ Create Storage Performance Policy ◈ Create Storage Access Policy ◈ Create Storage QoS Policy

Create Storage QoS Policy

When using the Hyper-V hypervisor, what is the default mouse release key combination that will transfer mouse control from the VM back to the host? ◈ Ctrl + Alt + left arrow ◈ Ctrl + Enter ◈ Ctrl + Alt + Insert ◈ Ctrl + Home

Ctrl + Alt + 𝐥𝐞𝐟𝐭 𝐚𝐫𝐫𝐨𝐰

What are the two major console interfaces used to work with an 𝐄𝐒𝐗𝐢 𝐡𝐨𝐬𝐭? ◈ Direct Console User Interface (DCUI) and vCLI ◈ vSphere ESXi Control Center and vSphere Shell Interface ◈ Remote Access Client (RAC) and vConsole ◈ vSphere Remote Console and vTerminal

Direct Console User Interface (DCUI) and vCLI

When creating a cluster of ESXi hosts, what option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts? ◈ Clustered Computing Service (CCS) ◈ Distributed Resource Scheduler (DRS) ◈ Multi-Host Computing (MHC) ◈ Shared Process Threading (SPT)

Distributed Resource Scheduler (DRS)

Where in the Hyper-V Settings window for a virtual machine can you configure the ability of the virtual machine to access local resources on the host computer, such as audio, printers, and USB devices? ◈ Host Resource Permissions ◈ Peripheral Devices ◈ Enhanced Session Mode Policy ◈ Hardware Sharing

Enhanced Session Mode Policy

A VMFS iSCSI based data store 𝐜𝐚𝐧'𝐭 be dynamically expanded due to the nature of the VMFS file system structure. ◈ True ◈ False

False

A standard vSphere virtual switch can have a maximum of 120 ports. ◈ True ◈ False

False

A virtual machine that is paused on Hyper-V has a saved state, similar to a snapshot, that is reverted to when the virtual machine is resumed. ◈ True ◈ False

False

Available on both generations of virtual machines, Secure Boot can be used to block unauthorized software and operating systems from running at boot. ◈ True ◈ False

False

Both versions of the .NET Framework required by the Virtual Machine Manager are installed on Windows Server 2016 by default. ◈ True ◈ False

False

Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller. ◈ True ◈ False

False

NIC teaming policies are set for an entire standard switch, and cannot be changed at the port group level. ◈ True ◈ False

False

The Jobs workspace displays the status of all jobs over the past 120 days, and these jobs can be sorted and filtered. ◈ True ◈ False

False

The VMM Console has a built in restore function for recovering from backups. ◈ True ◈ False

False

You are attempting to install a Windows Server 𝟐𝟎𝟎𝟖 guest OS to a SCSI based drive within a generation one virtual machine, however, you find you are unable to perform the install. What is the reason for this failure? ◈ A SCSI based drive can't be added to a generation one virtual machine. ◈ Windows Server 2008 does not support the virtual SCSI controller used by generation one VMs in Hyper- ◈ Generation one virtual machines do not support a non-IDE based boot drive. ◈ The BIOS of a generation one virtual machine will not recognize the SCSI controller.

Generation one virtual machines do not support a non-IDE based boot drive.

You have enabled the "Data Exchange" feature within Integration Services for Hyper-V. What registry key is used to pass information back and forth between the guest and the host? ◈ HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters ◈ HKEY_USERS\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters ◈ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters ◈ HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters

HKEY_𝐋𝐎𝐂𝐀𝐋_𝐌𝐀𝐂𝐇𝐈𝐍𝐄\𝐒𝐎𝐅𝐓𝐖𝐀𝐑𝐄\Microsoft\𝐕𝐢𝐫𝐭𝐮𝐚𝐥 𝐌𝐚𝐜𝐡𝐢𝐧𝐞\Guest\Parameters

You have established a baseline using Windows Server Update Services, and would like to check the 𝐜𝐨𝐦𝐩𝐥𝐢𝐚𝐧𝐜𝐞 𝐬𝐭𝐚𝐭𝐮𝐬 𝐨𝐟 𝐚𝐥𝐥 𝐕𝐌𝐌 𝐬𝐞𝐫𝐯𝐞𝐫𝐬. Where can you find this information in VMM Console? ◈ In the Fabric ribbon, on the Servers node, select "Compliance". ◈ Under the Jobs workspace, create a new job, select "Check compliance" ◈ In the Library workspace, select all servers, right click, select "Show compliance details" ◈ Under the Settings workspace, go to the "Reports" section, click "View compliance report"

In the 𝐅𝐚𝐛𝐫𝐢𝐜 𝐫𝐢𝐛𝐛𝐨𝐧, on the Servers node, select "Compliance".

What is 𝐍𝐎𝐓 a part of the VMware platform services component of vCenter Server? ◈ License service ◈ vCenter Single Sign On ◈ Lookup service ◈ Inventory database service

Inventory database service

What is 𝐍𝐎𝐓 a part of the VMware vCenter services component of vCenter Server? ◈ Auto Deploy service ◈ Web Client ◈ VMware Certificate Authority ◈ Inventory database service

Inventory database service

When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file? ◈ Nothing; vSphere templates are created using information in a sub directory of the VM. ◈ It is replaced by a .vmtx template configuration file. ◈ It is supplemented by a .vmtx file, as both files are required to define the VM. ◈ It is modified to include the settings required for creating the template.

It is replaced by a .vmtx template configuration file.

At what point is a Hyper-V host considered to be managed by a VMM instance? ◈ It is managed once the VMM Management Server is configured to handle all activity on the host. ◈ It is only managed by VMM after it has been successfully added via the VMM Console. ◈ It is managed only after the server is joined to an Active Directory domain. ◈ It is managed once the VMM Management Server is installed.

It is 𝐨𝐧𝐥𝐲 managed by 𝐕𝐌𝐌 after it has been successfully added via the VMM Console.

What does the "𝐑𝐞𝐦𝐞𝐝𝐢𝐚𝐭𝐞" command do in the Fabric ribbon while on the Servers node? ◈ It performs automatic recovery of failed jobs on all servers managed by VMM. ◈ It refreshes the list of all hosts that have the VMM Local Agent installed, and re-installs the agent on hosts that are no longer functioning properly. ◈ It provides the option to install missing updates or to override the baseline used for compliance when a machine is found to be non-compliant. ◈ It resolves missing items from the Library and clears any errors resulting from missing items.

It provides the 𝐨𝐩𝐭𝐢𝐨𝐧 𝐭𝐨 𝐢𝐧𝐬𝐭𝐚𝐥𝐥 𝐦𝐢𝐬𝐬𝐢𝐧𝐠 𝐮𝐩𝐝𝐚𝐭𝐞𝐬 or to 𝐨𝐯𝐞𝐫𝐫𝐢𝐝𝐞 𝐭𝐡𝐞 𝐛𝐚𝐬𝐞𝐥𝐢𝐧𝐞 used for compliance when a machine is found to be non-compliant

What does the 𝐂𝐭𝐫𝐥 + 𝐀𝐥𝐭 + 𝐁𝐫𝐞𝐚𝐤 𝐤𝐞𝐲 combination do within Hyper-V? ◈ It pauses the currently selected running virtual machine. ◈ It performs a paste operation. ◈ It toggles the use of the Full Screen Mode. ◈ It releases the host mouse and keyboard from the VM's management screen.

It toggles the use of the 𝐅𝐮𝐥𝐥 𝐒𝐜𝐫𝐞𝐞𝐧 𝐌𝐨𝐝𝐞.

What workspace in the VMM Console stores all of the 𝐯𝐢𝐫𝐭𝐮𝐚𝐥𝐢𝐳𝐚𝐭𝐢𝐨𝐧 𝐫𝐞𝐬𝐨𝐮𝐫𝐜𝐞𝐬 that VMM uses? ◈ VMs and Services ◈ Fabric ◈ Jobs ◈ Library

Library

When interacting with a virtual machine, what option under the virtual machine tab allows you to sync with Microsoft Azure Site Recovery Vault to provide a failover option? ◈ Manage Protection ◈ Cloud Sync ◈ Azure Backup ◈ Cloud Mirroring

Manage Protection

What happens when ESXi hosts are put into lockdown mode? ◈ The ESXi server no longer allows virtual machine modifications or changes in running state. ◈ No users are able to log into ESXi hosts through vCenter, they must log in directly. ◈ No users are able to log into ESXi hosts, they must authenticate with vCenter Server. ◈ The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server.

No users are able to log into ESXi hosts, they must authenticate with vCenter Server.

What advanced command-line interface serves as a front end for specialized commands, known as 𝐜𝐦𝐝𝐥𝐞𝐭𝐬? ◈ PowerShell ◈ Command Prompt ◈ Windows Bash ◈ Z Shell

PowerShell

When connecting to a virtual machine through VMM Console, what is a valid option for interacting with the guest OS? ◈ Terminal Services Access (TSA) ◈ Remote Desktop (RDP) ◈ Virtual Network Computing (VNC) ◈ Remote Buffer Viewer (RBV)

Remote Desktop (RDP)

What command should be used to recover VMM SQL data from a backup? ◈ VMM_restore.ps1 ◈ SCVMMRecover.exe ◈ SCVMM_rec.exe ◈ vmmrevert.exe

SCVMMRecover.exe

What configuration file name would be assigned to the Raw Device Map (RDM) pointer file for a VM named Srv1? ◈ Srv1.rdm.vmdk ◈ Srv1.vmdk.rdm ◈ Srv1.vswp ◈ Srv1.rdm.vswp

Srv1.rdm.𝐯𝐦𝐝𝐤

What are the two different types of 𝐜𝐡𝐞𝐜𝐤𝐩𝐨𝐢𝐧𝐭𝐬? ◈ Standard and production ◈ Supplemental and tertiary ◈ Production and standby ◈ Primary and secondary

Standard and production

While adding a new ESXi host and configuring a NAT adapter, you receive a warning that one or more hosts have no assigned physical network adapters. What should be done? ◈ The host has no compatible network adapters, so a dedicated supported adapter should be installed. ◈ The vswitch0 virtual switch on the host has no configured adapters. ◈ The host's vmnet8 interface is not configured ◈ The "Assign uplink" icon should be selected after the NAT network adapter is added.

The "Assign uplink" icon should be selected after the NAT network adapter is added.

What statement regarding the VMM management server is accurate? ◈ The VMM Management Server requires a minimum of 8 GB of RAM. ◈ The VMM Management Server requires a minimum of 16 GB of RAM. ◈ The VMM Management Server must be installed on an Active Directory domain controller. ◈ The VMM Management Server must be installed on a server that is a member of an Active Directory domain.

The VMM Management Server must be 𝐢𝐧𝐬𝐭𝐚𝐥𝐥𝐞𝐝 𝐨𝐧 𝐚 𝐬𝐞𝐫𝐯𝐞𝐫 that is a member of an Active Directory domain.

You are using a gigabit Ethernet adapter (vmnic1) on an ESXi host, and you have found that the status screen displays the adapter as being connected at 100 Mb, full duplex. You have verified that the switch your server connects to has 1 Gbps capable ports. What is most likely the problem? ◈ The cable connecting the server and switch is damaged. ◈ The adapter's driver in ESXi does not have 1 Gbps capability. ◈ The adapter has been manually configured to a speed of 100 Mb, duplex operation. ◈ The virtual machine using vmnic1 has limited the speed of the interface.

The adapter has been manually configured to a speed of 100 Mb, duplex operation.

When creating a guest OS profile, the identity information is set to "*". What does this mean? ◈ The guest OS will be assigned a random name. ◈The username associated with the guest OS profile is a wildcard, allowing any user to make use of the profile. ◈ The identity information will be copied from the host VMM and used to determine the UUID of the guest. ◈ The guest OS will allow anonymous logins due to the use of a wildcard.

The guest OS will be assigned a random name.

What guest operating system information does 𝐧𝐨𝐭 typically require modification when creating a template? ◈ The guest OS license settings ◈ The guest OS hostname ◈ The guest OS partition layout ◈ The guest OS network settings

The guest OS 𝐩𝐚𝐫𝐭𝐢𝐭𝐢𝐨𝐧 𝐥𝐚𝐲𝐨𝐮𝐭

What is a valid step that should be taken to make using iSCSI technology on a network more secure? ◈ The iSCSI traffic should be isolated to a dedicated and separate network. ◈ The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic. ◈ The network should make use of hardware based iSCSI instead of software based iSCSI. ◈ The iSCSI traffic should be encrypted using CHAP.

The iSCSI traffic should be isolated to a dedicated and separate network.

What statement regarding the use of lockdown mode is accurate? ◈ The vCLI and DCUI options are still available for use by any user. ◈ A user may access ESXi hosts individually as long as they are members of the "Local Admins" role. ◈ The root user is still able to log in via the DCUI console. ◈ The lockdown mode only affects the use of the vCLI.

The root user is still able to log in via the DCUI console.

During the installation of VMM, you provided your administrative domain account to the installer as the service account. Now, operations are failing. What is the cause of the issue? ◈ The service account should not be the same account you are currently logged into while performing the install. ◈ The service account can't be an account managed by Active Directory, it must be a local account only. ◈ The service account must be a member of the Enterprise Administrators group in the domain. ◈ The service account is not meant to be an administrative account, for security reasons.

The service account should not be the same account you are currently logged into while performing the install.

A security policy has been applied to an individual port on a virtual switch. The switch itself has a conflicting policy configured. What setting has priority? ◈ The settings at the virtual switch level will have priority, as the policy is inherited by the port. ◈ The overall setting will be disabled until the conflicting settings are manually changed. ◈ The more restrictive setting will be used automatically. ◈ The settings on the port will have priority, because the policy is overridden at the port level.

The settings on the 𝐩𝐨𝐫𝐭 𝐰𝐢𝐥𝐥 𝐡𝐚𝐯𝐞 𝐩𝐫𝐢𝐨𝐫𝐢𝐭𝐲, because the policy is overridden at the port level.

After removing a static software based iSCSI target, you discover hours later that the target has been returned to the list of targets. What is the most likely cause? ◈ The iSCSI initiator cannot remove a target that has been configured by vCenter Server for use on the host. ◈ The static target cannot be removed without deleting all associated data stores utilized by the host. ◈ You do not have the proper permissions to remove a static target, causing the job to remove the target to fail. ◈ The static target was added via dynamic discovery, and a rescan operation has re-added it.

The static target was added via dynamic discovery, and a rescan operation has re-added it.

Where should you check to ensure that both the DEP/NX bit and hardware virtualization are enabled for your host machine running Windows Server 𝟐𝟎𝟏𝟔 Standard? ◈ Device Manager, under CPU ◈ The Microsoft Management Console. ◈ Under Control Panel, in the System application. ◈ The system BIOS configuration screens.

The system BIOS configuration screens.

What happens when the "𝐃𝐞𝐥𝐞𝐭𝐞" link is used from the Actions menu in Hyper-V Manager? ◈ The virtual machine configuration files and virtual hard disks are deleted. ◈ The virtual machine is removed from the list in Hyper-V manager, but both the configuration files and disk files remain intact. ◈ The virtual machine configuration files are removed, but the virtual disk files are left in place. ◈ The virtual machine configuration files are retained, but the virtual disk files are deleted.

The virtual machine configuration files are 𝐫𝐞𝐦𝐨𝐯𝐞𝐝, but the virtual disk files are 𝐥𝐞𝐟𝐭 𝐢𝐧 𝐩𝐥𝐚𝐜𝐞.

What statement regarding the vpxa process is accurate? ◈ The vpxa process communicates commands from the vSphere client to the hostd process. ◈ The vpxa process is responsible for managing most of the operations on the ESXi host. ◈ The vpxa process serves as an intermediary between the vpxd process and the hostd process. ◈ The vpxa process controls access to the virtual machines and storage volumes on an ESXi host.

The vpxa process serves as an intermediary between the 𝐯𝐩𝐱𝐝 process and the 𝐡𝐨𝐬𝐭𝐝 process.

A virtual machine providing services for your network was recently hacked and used to spoof MAC addresses on your network to target other systems. What policies could you set to prevent this from reoccurring? ◈ The MAC address changes and forged transmits policies should be set to "Reject". ◈ The promiscuous mode and MAC address changes policies should be set to "Reject". ◈ The promiscuous mode and the forged transmits policies should be set to "Reject" ◈ Only the promiscuous mode needs to be set to reject.

The 𝐌𝐀𝐂 𝐚𝐝𝐝𝐫𝐞𝐬𝐬 𝐜𝐡𝐚𝐧𝐠𝐞𝐬 and 𝐟𝐨𝐫𝐠𝐞𝐝 𝐭𝐫𝐚𝐧𝐬𝐦𝐢𝐭𝐬 𝐩𝐨𝐥𝐢𝐜𝐢𝐞𝐬 should be set to "Reject".

What is used to facilitate the use of virtual machine dynamic memory? ◈ The virtualization features of the processor are used to overload and compress the amount of physical RAM needed for the dynamic memory. ◈ The smart paging file, which is normally located in the same directory as the virtual machine configuration files. ◈ A registry entry that enables sharing the host's page file with all guest machines. ◈ The virtual hard disk associated with the virtual machine.

The 𝐬𝐦𝐚𝐫𝐭 𝐩𝐚𝐠𝐢𝐧𝐠 𝐟𝐢𝐥𝐞, which is normally located in the same directory as the virtual machine configuration files.

When a virtual machine in Hyper-V is saved from the Action menu, where is the virtual machine's memory and state information saved to? ◈ They're both saved to the virtual machine's configuration file. ◈ They're both saved to the virtual machine's virtual hard disk file. ◈ They're both saved to a file on the host computer. ◈ They're both saved to the guest OS's page file, much like a traditional suspend operation.

They're both saved to a file on the host computer

Diskette drives are only available on generation one virtual machines. ◈ True ◈ False

True

Each VMkernel port must be configured with its own IP address and gateway. ◈ True ◈ False

True

Some VMware license keys can be split by applying them to multiple assets. For example, a four-CPU license can be split by applying it to 2 two-CPU hosts ◈ True ◈ False

True

The VMM console can be installed on different computers throughout a network, but they can only manage one VMM server at a time. ◈ True ◈ False

True

The e1000 network adapter type is the default adapter used by vSphere for virtual machines that run 64-bit guest operating systems. ◈ True ◈ False

True

The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server. ◈ True ◈ False

True

VMM can be installed in a different forest than the VMM Management Server, however, this requires a two way trust between the cross forest domains. ◈ True ◈ False

True

VMware vSphere 6 provides support for USB 3.0 devices in virtual machines. ◈ True ◈ False

True

Virtual machine performance suffers 𝐰𝐢𝐭𝐡𝐨𝐮𝐭 the installation of Integration Services for Hyper-V VMs. ◈ True ◈ False

True

When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the 𝐯𝐩𝐱𝐚 process. ◈ True ◈ False

True

What is the file name used for an answer file for Windows Vista or Windows Server 2008 or newer? ◈ Unattend.xml ◈ Unattend.ini ◈ answer.txt ◈ Custom.bat

Unattend.𝐱𝐦𝐥

A user has asked for your assistance in restoring the wizard windows and confirmation messages that they've checked the "Do not show this again" option. Where can this setting be found? ◈ Under the Actions menu, "Reset Check Boxes" option. ◈ Under the virtual machine settings window, in the "Management" section. ◈ Under the Hyper-V Settings dialog box, within the "Server" section. ◈ Under the Hyper-V Settings dialog box, within the "User" section.

Under the Hyper-V Settings dialog box, within the "𝐔𝐬𝐞𝐫" section.

Which of the following is 𝐍𝐎𝐓 considered one of the three major components of the Virtual Machine Manager? ◈ VMM Console ◈ VMM Local Agent ◈ VMM Management Server ◈ VMM Service Account

VMM 𝐒𝐞𝐫𝐯𝐢𝐜𝐞 𝐀𝐜𝐜𝐨𝐮𝐧𝐭

What virtual machine configuration file holds the virtual machine's 𝐬𝐧𝐚𝐩𝐬𝐡𝐨𝐭 𝐬𝐭𝐚𝐭𝐞 information? ◈ VM_name.vswp ◈ VM_name.vmss ◈ VM_name.vmdk ◈ VM_name.vmsd

VM_name.𝐯𝐦𝐬𝐬

A production type checkpoint within Hyper-V utilizes what service in the guest OS to perform the 𝐜𝐡𝐞𝐜𝐤𝐩𝐨𝐢𝐧𝐭? ◈ Background Intelligent Transfer Service ◈ Integration Services Checkpoint for Windows ◈ Volume Shadow Copy Service ◈ Windows Backup Service

Volume Shadow Copy Service

On what operating system is the VMM Local Agent 𝐍𝐎𝐓 capable of installation? ◈ Windows 10 ◈ Windows Server 2016 Hyper-V ◈ Windows 7 ◈ VMware ESX Server

Windows 7

The creation of a baseline for checking if a VMM server has all required patches requires the use of what Microsoft service? ◈ Windows Server Update Services ◈ Network Health role ◈ VMM Monitor role ◈ Microsoft Baseline Reporting

Windows Server Update Services

What Windows OS is 𝐧𝐨𝐭 supported by Microsoft for installation within Hyper-V? ◈ Windows Server 2008 R2 ◈ Windows Home Server 2011 ◈ Windows Vista Professional Edition SP2 ◈ Windows 7 Home Edition

Windows 𝟕 𝐇𝐨𝐦𝐞 𝐄𝐝𝐢𝐭𝐢𝐨𝐧

What statement regarding the installation requirements for Hyper-V is accurate? ◈ Hyper-V will not run on a processor with the DEP/NX bit feature. ◈ Hyper-V does not require the use of a processor with hardware virtualization. ◈ To install Hyper-V, you need a 32-bit or 64-bit version of Windows Server 2016. ◈ You must have a processor that supports SLAT in order to install Hyper-V.

You must have a 𝐩𝐫𝐨𝐜𝐞𝐬𝐬𝐨𝐫 that supports 𝐒𝐋𝐀𝐓 in order to install Hyper-V.

During installation, the vCenter Server appliance sets up a Single Sign On account using what username? ◈ manager@domain_name ◈ administrator@domain_name ◈ root@domain_name ◈ admin@domain_name

administrator@domain_name

What traffic shaping policy option determines the number of kilobits per second to allow across a port, averaged 𝐨𝐯𝐞𝐫 𝐭𝐢𝐦𝐞? ◈ average bandwidth ◈ average throughput ◈ burst size ◈ average peak bandwidth

average bandwidth

You notice that the last job for a virtual machine you are attempting to work on failed, causing the virtual machine to not start. What is 𝐍𝐎𝐓 one of the three possible options under repair? ◈ return the virtual machine to the state before the failed job ◈ clone settings and recreate the virtual machine ◈ ignore the job failure ◈ retry the last job that failed

clone settings and recreate the virtual machine

What type of migration involves a virtual machine that is 𝐩𝐨𝐰𝐞𝐫𝐞𝐝 𝐨𝐟𝐟 to a different shared data store or data store that is accessible by only one host? ◈ suspended migration ◈ Storage vMotion migration ◈ Enhanced vMotion migration ◈ cold migration

cold migration

You would like to migrate a 𝐩𝐨𝐰𝐞𝐫𝐞𝐝 𝐨𝐧 virtual machine to a new data store and a new host. What type of migration should you use? ◈ enhanced vMotion ◈ vMotion migration ◈ suspended migration ◈ cold migration

enhanced vMotion

You are getting ready to deploy a virtual machine on a Hyper-V host, and have come to the "Specify Generation" window. What generation should you select if your virtual machine will have a 32-bit guest OS? ◈ Both generations will support a 32-bit operating system. ◈ Neither generations will support a 32-bit operating system. ◈ generation two ◈ generation one

generation one

What process is responsible for managing most of the operations on an ESXi host? ◈ kernd ◈ hostd ◈ vpxd ◈ vpxa

hostd

What traffic shaping policy option determines the max number of kilobits per second to allow across a port when it is sending a 𝐛𝐮𝐫𝐬𝐭 𝐨𝐟 𝐭𝐫𝐚𝐟𝐟𝐢𝐜? ◈ burst size ◈ average bandwidth ◈ surge bandwidth ◈ peak bandwidth

peak bandwidth

What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server? ◈ privilege ◈ ability ◈ trait ◈ role

privilege

What term is used to describe the top most object in the vCenter Server inventory? ◈ root object ◈ top host ◈ head node ◈ primary branch

root object

How many archive logs are maintained for a virtual machine at any one time? ◈ four ◈ two ◈ eight ◈ six

six

What type of virtual switch exists only within a 𝐬𝐢𝐧𝐠𝐥𝐞 vSphere hypervisor? ◈ distributed ◈ standard ◈ isolated ◈ independent

standard

You are trying to support a VOIP application on a virtual machine, and need to prioritize VOIP traffic. What kind of virtual switch policy should you use? ◈ security policy ◈ application priority policy ◈ NIC teaming policy ◈ traffic shaping policy

traffic shaping policy

What are the two GUI clients provided by VMware for use with vSphere? ◈ vSphere Controller and vSphere Web Client ◈ vSphere Web client and vSphere Client ◈ Direct Console User Interface (DCUI) and vSphere User Frontend ◈ visual CLI and vSphere Client

vSphere 𝐖𝐞𝐛 client and vSphere 𝐂𝐥𝐢𝐞𝐧𝐭

What command can you use to add a comma separated list of users to an ESXi server using VCLI? ◈ vicfg-user -u ◈ vicfg-adduser ◈ vicfg-user --adduser -l ◈ viuser-cfg --add --type=user

vicfg-𝐮𝐬𝐞𝐫 -𝐮

What is 𝐍𝐎𝐓 one of the valid choices available for ESXi's virtual SCSI adapter? ◈ LSI Logic Parallel ◈ BusLogic Parallel ◈ LSI Logic SAS ◈ BusLogic SAS

𝐁𝐮𝐬Logic 𝐒𝐀𝐒

When using a physical graphics card to accelerate video and 3D rendering in a virtual machine, what role must be added to the server? ◈ Virtualized Desktop Infrastructure role ◈ Remote Desktop Virtualization role ◈ Terminal Services role ◈ 3D Render Host role

𝐑𝐞𝐦𝐨𝐭𝐞 Desktop Virtualization role

You are attempting to migrate a virtual machine to a different host. The new host has an 𝐈𝐧𝐭𝐞𝐥 𝐩𝐫𝐨𝐜𝐞𝐬𝐬𝐨𝐫, while the old host has an AMD processor. What type of migration must be performed? ◈ vMotion migration ◈ suspended migration ◈ Enhanced vMotion migration ◈ cold migration

𝐜𝐨𝐥𝐝 migration

What is the default disk type utilized by the Hyper-V hypervisor? ◈ differencing disk ◈ fixed disk ◈ dynamic disk ◈ independent disk

𝐝𝐲𝐧𝐚𝐦𝐢𝐜 disk

You are assigning user roles to users within your Active Directory environment for use with VMM. What role should you assign a user that needs to manage self-service users as well as create and manage their own virtual machines? ◈ tenant administrator ◈ delegated administrator ◈ self service manager ◈ fabric administrator

𝐭𝐞𝐧𝐚𝐧𝐭 administrator

What is the recommended number of processor cores that should be available for the database server used by VMM? ◈ 16 cores ◈ 4 core ◈ 2 cores ◈ 8 cores

𝟏𝟔 cores


Set pelajaran terkait

Chapter X: Human Resource Management

View Set

Grounding and Bonding Terms and Conditions

View Set

Chapter 9: Cognitive and Behavioral Strategies

View Set

2 - ¿Qué te gusta hacer cuando...?

View Set

Ch. 15: Continuing Developments in Psychology

View Set