Virtualization - 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When Linux partitioned the 20GB allocated for disk storage, how much was actually allocated for user space?

17.96 GB

An IPv4 address is represented as ________ octets in the dot and decimal format.

4

'Five nines' equates to how much downtime in a year?

5 minutes and 18 seconds

When Linux partitioned the 20GB allocated for disk storage, how much was reserved for boot software?

500 MB

Enabling Hyper-threading with usually improve performance by

About 30%

Storage virtualization is

Abstracting of the resources to the virtual machines

Cloned virtual machines:

All of the above

___________________ rules guarantee that two selected virtual machines will not run on the same virtualization host.

Anti-affinity

In a three-tier architecture, the component that runs the program code and enforces the business processes is the:

Application Server

________________ links together two or more servers with networking and shared storage to provide an environment to enable greater uptime.

Clustering

Virtualizing a sound card is somewhat of a misrepresentation because:

Control is passed to the sound card on the local device, not the host server

_________________ is a storage capability that removes duplicate chunks of data and replaces them with pointers back to a single original item.

Deduplication

Virtual machines can be protected in the event of a data center interruption by utilizing:

Disaster recovery solutions

Which if the following is not an example of memory optimization

Dynamic Addition

_____________ is used to automatically provide IP addresses for both physical and virtual servers.

Dynamic Host Configuration Protocol (DHCP)

A host server has 4 processors, each with 8 cores. If you can allocate 8 vCPUs per pCPU, how many vCPUs can be allocated?

Each processor has eight cores. Each core (pCPU) can support eight vCPUs. 4 processors x 8 cores x 8 vCPUs = 256 vCPUs

VMware Tools are installed in a virtual machine for all except:

Enhanced memory utilization

Linux operating systems should not be modified once the installation is complete.

False

Shares are used to determine the guaranteed minimum amount of a resource allocated to a virtual machine.

False

T/F A virtual host connects to storage resources only through a specialized storage controller called a Host-Bus Adapter (HBA) or a Fibre-Channel Controller (FCC).

False

T/F A virtual machine may only connect to one virtual switch at a time

False

T/F Adding vCPUs is usually the best method to resolve performance problems in a virtual machine.

False

T/F As of 2012, the dominant server operating system on the x86 platform was Linux

False

T/F Because of the simplicity of the process, most clones of virtual machines are created by hand.

False

T/F Hyper-threading does not work in a virtualization environment.

False

T/F Hypervisors allow multiple virtual machines to simultaneously share USB devices.

False

T/F It is common practice to reserve memory in amount equal to 20 percent of the physical server memory for the exclusive use of the hypervisor.

False

T/F Memory Ballooning allows a virtual machine to expand past its allocated memory amount in the event of memory contention.

False

T/F Memory paging is a desired processed because it speeds up system performance

False

T/F Microsoft Cluster Services and Oracle Real Application Clusters cannot be deployed in a virtual infrastructure.

False

T/F One main reason that Linux is being used more often as the operating system for production servers is due to its better performance characteristics than other operating systems.

False

T/F Personalization features like wallpapers and screen savers are important to a virtual machine.

False

T/F Snapshots are another alternative to backing up virtual machines.

False

T/F Storage utilization in a virtual environment requires planning for significant overhead due to the hypervisor's activity between the storage resources and the virtual guests.

False

T/F There are currently no technologies available that can manage storage IO to ensure that specific virtual machines will receive adequate bandwidth in the event of contention.

False

T/F Virtual machine tools are not used to help increase availability.

False

T/F Virtual machines only support peripheral devices and connection methods that are offered and supported on current physical servers.

False

T/F Virtual machines require special drivers to connect to virtual networks.

False

T/F When configuring resource pools for a cluster, all of the resources must be allocated to the pools.

False

A virtual machines that is running on a host with an AMD processor can be live migrated to a host with an Intel processor.

False In a mixed environment, the instruction sets of the different microprocessors are not identical, so you cannot live-migrate the virtual machines from an AMD host to an Intel host, or vice versa. In order to move a virtual machine from an AMD host to an Intel host, or the reverse, you need to shut down that virtual machine, and then you can restart it on the second host with the different chipset

A mission critical virtual machine can be protected from a virtualization host failure by utilizing:

Fault tolerance

Deduplication technology can work with all of the following data entities except:

File systems

_______________ are normally no longer found on computers, but were once the most popular media for moving data from system to system.

Floppy disks

Resource pools can be applied to all of the following except:

Groups of clusters

Which of the following does VMware Player not provide regarding memory management:

Guest OS Recommended Maximum Memory value

Mice, keyboards, and graphical displays are all examples of _________.

Human Interface Devices (HIDs)

_______________ is an Intel technology that improves performance by allowing more than one set of instructions to be executed on a processor.

Hyper-threading

Dynamic addition of memory (hot-add) into a virtual machine depends on:

If the guest operating system supports dynamic addition

Virtual machine tools are installed to provide: (choose all that apply)

Improved performance Better user experience

One reason to create a virtual machine with multiple multi-core vCPUs is:

In some cases, licensing allows operating systems to use more resources with the multi-core vCPUs

Virtual machines can communicate only with other virtual machine across a(n) ___________________.

Internal virtual switch

One of the primary reasons for poor performance in a virtual environment is due to:

Lack of adequate storage IO throughput

Availability solutions that translate from the physical environment to the virtual environment include all but the following:

Live migration

The preferred way to ensure that an application performs correctly is to:

Measure performance regularly and adjust resources if necessary

The ability to allocate more virtual memory than physically exists on a host server is called _______________.

Memory Overcommit

Hypervisors manage the virtual machine's memory use of physical memory through the implementation of ____________.

Memory mapping tables

____________________ groups network adapters together for higher throughput and availability if one adapter in the group fails.

NIC teaming

The protocol that helps multiple servers keep their system time synchronized is:

NTP

Virtual appliances are often delivered in _____________ format so they can be quickly deployed on any hypervisor.

Open virtualization format (OVF)

____________________ is a storage technology that deals with how data is spread across multiple disks for both increased availability and improved performance.

RAID

Memory, or RAM, is another term for:

Random Access Memory

Virtual machines can bypass the hypervisor and connect directly to a physical device by using ___________.

Raw device mapping (RDM)

While physical floppy disks had a write-protect tab to guard against accidental data alteration or erasure, to achieve the same effect for a virtual floppy disk the ____________ option would need to be selected.

Read-only

Converged Network Adapters:

Reduce the number of NICs in a server and by consolidating traffic types across larger bandwidth

___________________ are aggregated collections of memory and CPU resources that can be shared among groups of virtual machines or other entities.

Resource pools

___________________ describes a condition where a virtual environment has deployed many servers without the benefit of adequate business processes and that environment is now overwhelmed.

Server sprawl

Virtual machines can be altered, and if those changes prove to cause problems, the virtual machine can be reverted to the original state through the use of:

Snapshots

Files that compose virtual machines can be move from one place to another without interrupting the virtual machine through the use of ___________________.

Storage Migration

_____________ is a Microsoft specific utility that is used to automate the customization of a Windows server.

Sysprep

Virtual machines that are not powered on and are used to create new virtual machines are known as:

Templates

________________ are virtual machines that already contain an operating system, are sometimes preloaded with application software, and are used to create new virtual machines.

Templates

Cloned virtual machines can be used for all except:

The restoration of a previous machine state

Virtual Machines can support all of the following USB devices except:

They can all be supported

VMware Workstation can be used to configure all of the following network connections except:

Transparent

T/F A limit, the performance setting indicating the greatest amount of resources a virtual machine can receive, can be set differently than the resource has been configured.

True

T/F A virtual NIC may only connect to one virtual switch.

True

T/F In a Linux virtual machine, the VMware Tools must be installed as a root user.

True

T/F Linked clones cannot operate if their reference virtual machine is not available.

True

T/F Live migration is a large component of increased availability in a virtual deployment.

True

T/F Most storage best practices translate well from the physical environment to the virtual environement.

True

T/F The installation of virtual machine tools, while very beneficial, is not a mandatory step in the creation of a virtual machine.

True

T/F The number one reason for system outages is human error.

True

T/F Though Moore's Law was originally used to describe the trend in processor performance, it is also applicable to memory.

True

T/F Virtual machines can be configured to utilize multiple monitors.

True

T/F Virtual machines can be configured with multiple processors and multiple cores per processor, just like a physical machine.

True

T/F Virtual machines with operating systems other than Microsoft Windows can also be cloned.

True

T/F Virtual networks and virtual switches can be used to transport both user data traffic and storage data traffic.

True

T/F When two virtual machines are constantly communicating, it is a good idea to apply VM-affinity rules to them so that they are always on the same host.

True

The _______________ offers a common connection for computer peripherals and provides data transfer and power capabilities for those devices.

Universal Serial Bus (USB) standard

Virtual machine tools are installed as all of the following except:

User application

Which of the following is not an example of a server operating system:

VMware ESXi

Virtualization hosts can use all of the following except:

Virtual Network Storage arrays

In a bridged network configuration:

Virtual machines have IP addresses that are unique to the network and can be seen from outside of the host

In a NAT network configuration:

Virtual machines have unique IP addresses but cannot be seen from outside of the host

In a three-tier architecture, the component that acts as the interface between the user and the application is the:

Webserver

________________ is when multiple entities are all simultaneously trying to use the same resource causing performance to suffer.

contention

Modern CPUs are often a package of multiple processors. These individual processors are also known as _________.

cores

On Linux systems, a system process is also known as a(n) ________________.

daemon

The maximum number of vCPUs that can be configured in a single virtual machine is:

it varies by the hypervisor vendor

When using snapshots, you can incorporate changes made into the base virtual machine by ______________.

merging snapshots

Best practice is to configure ___________ vCPU(s) for a new virtual machine.

one

Linux is considered to be a(n) ________________ operating system.

open-source

Memory blocks are also known as _________

pages

The process of copying memory blocks to disk storage is known as _____________.

paging

A full clone requires ______________ disk space that the original virtual machine consumes.

the same amount of

___________________ is when a file system consumes the entire allocated amount of space, whether or not it is ever used

thick provisioning

If you only had a physical DVD of the Red Hat Linux Installation media, you would choose ______________ as the connection type for the CD/DVD device in order to boot from the DVD when the virtual machine was powered on.

use physical drive

____________________ is a package of one or more virtual machines that make up an entire deployable application.

vApp

In a VMware environment, a .vmdk file represents a virtual machine's ________________.

virtual disk

A virtual machine connects from the virtual NIC to a(n) _____________.

virtual switch


Set pelajaran terkait

ACCT 2100 (W01) - Quizzes Review

View Set

Med Surg - Chapter 45 - Care of Critically Ill Patients with Neurologic Problem

View Set

Chapter 41: Professional Roles and Leadership

View Set

Political Science 101 - Unit 1 Quiz

View Set

Chapter 19: Endocrine Alterations

View Set

Chapter 20: Drug Therapy With Tetracyclines, Sulfonamides, and Urinary Antiseptics

View Set