15 & 16 Virtualization, Cloud Computing & Mobile Networking

Ace your homework & exams now with Quizwiz!

(LS 9_6 SCADA Q24): Which of the following SCADA technology terms below is a network of components that work together in order to remotely manage industrial equipment? Remote Terminal Unit DCS Network Link Supervisory Computer Programmable Logic Controller

DCS A Distributed Control System (DCS) is a network of components that work together in order to remotely manage industrial equipment.

(MMv3C17Q29): The term "bare-metal" virtualization software refers to which of the following? hypervisors VMMs virtual switches hardware consolidation

hypervisors Writers call both the hosted and bare metal, or native, virtualization software products hypervisor's.

(LS 9_5 Cloud Q18): Which of the following statements best describes a community cloud? Integrates one cloud service with other cloud services. Allows cloud services to be shared by several organizations. Provides cloud services to a single organization. Provides cloud services to just about anyone

Allows cloud services to be shared by several organizations. A community cloud is designed to be shared by several organizations. Access is restricted only two users within the organization who are sharing the community cloud infrastructure. Community cloud is a commonly hosted externally by third-party.

(LS 9_5 Cloud Q146) A public cloud provides which of the following services? Integrates one cloud service with other cloud services. Allows cloud services to be shared by several organizations. Provides cloud services to a single organization. Provides cloud services to just about anyone

Allows cloud services to be shared by several organizations. A public cloud can be accessed by anyone. Cloud-based computing resources are made available to the general public by a cloud service provider. The service provider may or may not require a fee for using these resources. For example, Google provides many publicly accessible cloud applications, such as Gmail and Google Docs.

(LS 9_5 Cloud Q14): Which of the following best describes the Platform as a Service (PaaS) cloud computing service mode? PaaS Delivers software applications to the client either over the Internet or on a local area network. PaaS stores and provides data from a centralized location without the need for local collection and storage. PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. PaaS delivers everything a developer needs to build an application onto the cloud infrastructure

PaaS delivers everything a developer needs to build an application onto the cloud infrastructure Platform as a Service (PaaS) delivers everything a developer needs to build an application onto the cloud infrastructure. The development comes without the cost and complexity of buying and managing the underlying hardware and software layersSoftware as a Service (SaaS) delivers software applications to the client over the Internet or on a local area network. Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. Client deploys and run software without purchasing servers, datacenter space, or network equipment. Data as a Service (DaaS) stores and provides data from a centralized location without the need for local collection and storage.

(LS 9_6 SCADA Q27): Which of the following SCADA technology terms connects equipment to the network via a physical medium and converts digital data into signals that the equipment can process? Remote Terminal Unit DCS Network Link Supervisory Computer Programmable Logic Controller

Programmable Logic Controller Programmable logic controllers (PLCs) perform a function similar to RTUS (connecting SCADA equipment to the network). Most PLCs use a physical connection

(MMv3C17Q11): A technique that gives each virtual NIC a connection to a physical NIC is called: bridging routing NAT switching

bridging Since the physical server only has a single NIC there has to be a way in which virtualization gives individual VMs valid IP addresses and NICs. The simplest way in which this occurs is to bridge the NIC. This bridge works at Layer 2 of the OSI model, so each virtual NIC on each Virtual Machine gets a legitimate, unique MAC address.

(MMv3C17Q26): Which of the following advantages to virtualization provides significant cost savings in utility usage? hardware consolidation power savings system recovery system duplication

power savings Before virtualization, each server OS needed to be on a unique physical system. With virtualization, you can place multiple virtual servers on a single physical system, reducing electrical power use substantially. This is a significant cost in utility savings and usage. Hence, power saving is the main advantage when it comes to cost savings in utility usage.

(MMv3C17Q05): Which of the following describes software or hardware that converts the commands to and from the host machine into an entirely different platform? hypervisor Virtual Machine Manager supervisor emulator

emulator Emulation is much different from virtualization. An emulator is software or hardware that converts the commands to and from the host machine into an entirely different platform.

(MMv3C17Q20): VMware's ESX server can support up to how many CPUs, depending upon the version? 32 4 8 64

32 Most hypervisor's support a limited number of virtual CPUs, usually two at the most. ESX can support up to 32 CPUs, depending on the vSphere product version you purchase in order to support it.

(LS Virtual Q04): In virtualization which of the following best describes the role of the hypervisor? A hypervisor is created within the host operating system and simulates a hard disk for the virtual machine. A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor is a software implementation of a computer that executes programs like the physical machine. A hypervisor has the actual hardware in place on the machine, such as the hard disk drives, optical drive, RAM, and motherboard.

A hypervisor allows virtual machines to interact with the hardware without going through the host operating system. A hypervisor is a thin layer of software that resides between the virtual operating system (s) and the hardware. A hypervisor allows virtual machines to interact with the hardware without pouring through the host operant system. A hypervisor manages access to system resources such as the CPU, Storage and RAM.A physical machine (also known as the host operating system) has the actual hardware in place on the machine, such as the hard disk drives, optical drive, RAM and motherboard. A virtual machine is a software implementation of a computer that executes programs like a physical machine. The virtual machine (s) appears to be a self-contained and autonomous system (s). A virtual hard disk (VHD) is a file that is created within the host operant system and that simulates a hard disk for the virtual machine.

(LS 9_1 Storage Q04): Which of the following are typical components of a NAS device. Select two answers only. Initiator server. A minimal network OS One or more NICs External RAID array An FC switch.

A minimal network OS One or more NICs A NAS device typically consists of: * A RAID array with terabytes of storage space. * A motherboard with a processor and memory. * One or more NICs * a minimal network operating system

(MMv3C17Q15): Most virtual machine managers replace the CTRL-ALT-DELETE key sequence with: CTRL-ALT-INSERT CTRL-ALT-ESC CTRL-ALT-FN ALT-F4

CTRL-ALT-INSERT

(LS 9_5 Cloud Q15): Which of the following statements is not true regarding cloud computing? Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a web browser. Cloud computing requires end-user knowledge of the physical location and configuration of the system that delivers the services, The term cloud is used as a metaphor for the Internet, Cloud computing is software, data access, computation, and storage services provided to clients through the Internet.

Cloud computing requires end-user knowledge of the physical location and configuration of the system that delivers the services, Cloud computing does not require end-user knowledge of the physical location and configuration of the system that delivers the services. Other cloud computing details include the following:* Cloud computing is software, data access, computation, and storage services provided to clients through the Internet,* The term cloud is used as a metaphor for the Internet, based on the basic cloud drawing used to represent the telephone network, and later the Internet infrastructure in computer network diagrams.* Typical cloud computing providers deliver common business applications online that are accessed from another web service or software like a web browser, while the software and data are stored on servers.

(LS 9_4 VNetwork Q9): You are responsible for maintaining Windows workstation operating systems in your organization. Recently, an update from Microsoft was automatically installed on your workstations that caused an in-house application to stop working.To keep this from happening again, you decide to test all applications on a virtual machine before allowing them to be installed on production workstations.Currently, none of your testing virtual machines have a network connection. However, they need to be able to connect to the update service at Microsoft to download and install updates.What should you do? (Select two answers only. Both responses are part of the complete solution). Create a new virtual switch configured for bridged (external) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. Create a new virtual switch configured for host-only networking. Disable the switch port that the hypervisor's network interfaces connected to. Create a new virtual switch configured for internal networking.

Create a new virtual switch configured for bridged (external) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. To allow the virtual machines to communicate with the Microsoft update servers on the Internet, you need to do the following: Create a new virtual switch configured for bridged (external) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. Creating an internal or host only virtual switch would not allow the virtual machines to communicate on the production network through the hypervisor's network interface. Disabling the hypervisor switch port would also isolate the virtual machines from the production environment.

(LS 9_4 VNetwork Q08): You are an application developer. You use a hypervisor with multiple virtual machines installed to test your applications on various operating systems versions and additions.Currently, all of your testing virtual machines are connected to the production network through the hypervisor's network interface. However, you are concerned that the latest application you are working on could adversely impact other network hosts if errors exist in the code.To prevent this, you decide to isolate the virtual machines from the production network. However, they still need to be able to communicate directly with each other.What should you do? (Select two answers only. Both responses are part of the complete solution) Create MAC address filters on the network switch that block each virtual machines virtual network interfaces. Disable the switch port the hypervisor's network interfaces connected to. Create a new virtual switch configured for bridged (external) networking. Disconnect the network cable from the hypervisor's network interface. Create a new virtual switch configured for host only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch.

Create a new virtual switch configured for host only (internal) networking. Connect the virtual network interfaces in the virtual machines to the virtual switch. To allow the virtual machines to communicate with each other while isolating them from the production network you need to do the following:* Create a new virtual switch configured for host-only (internal) networking.* Connect the virtual network interface in the virtual machines to the virtual switch.Creating a bridged virtual switch would still allow the virtual machines to communicate on the production network through the hypervisor's network interface. Discovering the hypervisor's network cable, blocking the virtual machines MAC addresses, or disabling the hypervisor switch port would isolate the virtual machines from the production network, you would also prevent them from communicating with each other.

(LS Virtual Q02): What type of virtualization completely simulates a real physical host? Semi-virtualization Para virtualization Partial virtualization Full virtualization

Full virtualization In full virtualization, the virtual machine completely simulates a real physical host. This allows the most operant systems and applications to run within the virtual machine without being modified in any way. In partial virtualization, only some of the components of the virtual machine are virtualized. In para virtualization, the hardware is not virtualized.

(LS 9_1 Storage Q06): You were recently hired by a small startup company which is very small and has several remote employees.You have been asked to find a business service that would accommodate the current size of the company but would also be able to scale as the company grows. The service needs to provide adequate storage, as well as additional computing power.Which cloud service model should you use? IaaS Paas Daas Saas

IaaS Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. The client deploys and run software without purchasing servers, datacenter space, or network equipment.Software as a Service (SaaS) delivers software applications to the client either over the Internet or on a local area network. Platform as a Service (PaaS) delivers everything a developer needs to build an application onto the cloud infrastructure. The deployment comes without the cost and complexity of buying and managing the underlying hardware and software layers. Data as a Service (DaaS) stores and provides data from a centralized location without the need for local collection and storage.

(LS 9_4 VNetwork Q011): You want to be able to monitor and filter VM-to-VM traffic within a virtual network.What should you do? Create a virtual router with VRF technology. Implement a virtual firewall within a hypervisor. Define VLAN memberships on each VM Route VM-to-VM traffic through a physical firewall and back to the virtual machine.

Implement a virtual firewall within a hypervisor. Virtualized hosts are susceptible to the same network exploits as physical network hosts and need to be protected by a firewall. By implementing a firewall within the hypervisor itself, you can monitor and filter traffic on the virtual network as it flows between virtual machines.While routing VM-to-VM traffic through a physical firewall would work, it is very inefficient. A virtual router with VRF is used to create multiple networks from a single router interface. Configuring VLAN membership would not allow you to monitor and filter traffic.

(LS 9_1 Storage Q05): In a SAN implementation, the servers that connect to the shared storage devices are called which of the following? Server linkage Initiators Starters Targets

Initiators The servers that connect to shared storage devices are called initiators. They use initiator software to connect to and communicate with the SAN targets

(LS 9_5 Cloud Q19): Which of the following statements best describes a hybrid cloud? Integrates one cloud service with other cloud services. Allows cloud services to be shared by several organizations. Provides cloud services to a single organization. Provides cloud services to just about anyone

Integrates one cloud service with other cloud services. A hybrid cloud is composed of a combination of public, private, and community cloud resources from different service providers. The goal behind a hybrid cloud is to expand the functionality of a given cloud service by integrating it with other cloud services.

(MMv3C17Q19): Which of the following is an open-source virtual machine manager developed by Red Hat? Virtual PC Xen Virtual Box KVM

KVM KVM from Red Hat is a dominant player in the virtual machine market. Unlike the other virtual machine managers, KVM also supports a few non-86 processors.

(MMv3C17Q28): VMware Fusion is a popular virtual machine manager for which operating system? Solaris Linux Mac OS X Windows 7

Mac OS X

(MMv3C17Q14): Which of the following operating systems, when added as a virtual machine, requires a separate, licensed copy? Microsoft Windows Ubuntu Linux FreeDOS OpenBSD

Microsoft Windows On every virtual machine which you create on which you install Windows requires a separate legal copy of Windows which must be licensed.

(LS 9_4 VNetwork Q10): Which of the following is one of the major advantages that a virtual router has over a physical router? Faster routing performance. Allows the Virtual Router Redundancy Protocol (VRRP) to be used. Routing protocols are not needed to route data between networks. Multiple networks can be connected to a single interface

Multiple networks can be connected to a single interface The key advantage of a virtual router is it can support multiple networks on a single router interface. It does this by using a different routing table for each network. Physical routers are limited to a single network on each interface.Like physical routers, virtual routers use routing protocols to route data between networks. The Virtual Router Redundancy Protocol is used by physical routers to specify backup routers in the case of a failure. Virtual routers do not offer significant performance increases.

(LS 9_4 VNetwork Q12): Which of the following statements about virtual NICs are true? (Select two answers only). Virtual NICs can communicate only with other virtual NICs Virtual NICs don't have a MAC address. The type of NIC installed in the physical machine determines the type of virtual NIC that is emulated. Multiple virtual NICs can be added to a virtual machine. Virtual NICs need the appropriate driver installed in order to function

Multiple virtual NICs can be added to a virtual machine. Virtual NICs need the appropriate driver installed in order to function Within each virtual machine, you can configure one or more virtual network interfaces, which function in much the same manner as physical network interfaces. Virtual interfaces use Ethernet standards to transmit and receive frames on the network. The operating system within the virtual machine must have the appropriate driver installed to support the virtual network interface, just as with a physical network interface.When you configure a virtual network interface within a virtual machine's configuration you can specify the following;* The type of physical network interface to emulate. This allows for the best possible driver support by the operating system within the virtual machine.* A MAC address. Most hypervisors automatically assign a MAC address to each virtual machine interface. However, some hypervisors allow you to use a custom MAC address, if needed.* The network to connect to. Most hypervisors allow you to define many different virtual networks.* When you configure a virtual network interface, you will select which virtual network you want it to be connected to.

(LS 9_1 Storage Q03): You manage a network with three dedicated storage devices which is shown in the following diagram:Users on the network see only a single server. Which network-based storage technologies being used? iSCSI with clustering NAS with clustering NNAS Fibre Channel SAN

NAS with clustering NAS with clustering is being used. A NAS device is an appliance that is dedicated to file storage. With clustering, multiple NAS devices are grouped together to provide a degree of fault tolerance. To users on the network, the cluster appears as a single file server. Without clustering, the NAS devices would appear as three separate file servers.Because the storage devices are connected directly to the switch, it cannot be an iSCSI or Fibre Channel implementation. Both iSCSI and Fibre Channel implementations use a dedicated network to connect devices.

(LS 9_6 SCADA Q26): Which of the following SCADA technology terms connects the supervisory computer to the RTUs or PLCs Remote Terminal Unit DCS Network Link Supervisory Computer Programmable Logic Controller

Network Link Network links are used to connect the supervisory computer to the RTUs or PLCs.

(MMv3C17Q02): Which of the following is a cloud service offering virtualized networks, servers, and services? Network as a Service Software as a Service Virtualization as a Service virtual machine

Network as a Service Network as a Service (NaaS) is a small division of what is called cloud computing. If a virtual machine or computer is at your location you basically called on-site. If a virtual server is somewhere other than at your location, you would call it offsite. It really doesn't matter as we would refer to this as cloud computing

(MMv3C17Q24): Which of the following is the first step a virtual machine takes when it is powered on? POST instant-on snapshot dedicated bridging

POST A VM goes through a POST process just like any computer when it is powered on

(MMv3C17Q18): Which of the following is a virtual machine manager for Mac OS X? VirtualPC Parallels Hyper-V ESX

Parallels Parallels is the most popular virtualization manager for MAC OS X . On the other hand you can use VMWare Fusion as well

(LS VOIP Q01): Which of the following features is used with digital IP phones to supply power through a switch port? Spanning Tree VPN PoE Trunking 802.1x

PoE Power over Ethernet (PoE) supplies power to end devices through the RJ-45 Ethernet switch port. Power to the phone is carried on unused wires within the drop tables.Spanning tree is a protocol on a switch that allows the switch to maintain multiple paths between switches within a subnet. The spanning tree protocol runs on a switch and is used to select a single path between any two switches. Trucking allows a switch to forward VLAN traffic between switches. 802.1x is an authentication protocol used with port security or port authentication.

(LS 9_5 Cloud Q17): A private cloud provides which of the following services? Integrates one cloud service with other cloud services. Allows cloud services to be shared by several organizations. Provides cloud services to a single organization. Provides cloud services to just about anyone

Provides cloud services to a single organization. A private cloud provides resources to a single organization. Access is restricted to only the users within that organization. An organization commonly enters into an agreement with a cloud service provider, which provide secure access to cloud-based resources. The organizations data is Separate and secure from any other organization using the same service provider.

(MMv3C17Q25): Which of the following is the most limiting factor in a host's ability to run virtual machines? hard disk space network bandwidth CPU RAM

RAM A single hypervisor on a single system will be able to run as many virtual machines as RAM, CPU and drive space allowed. However, RAM will always be the main limiting factor in the number of virtual machines that will be running simultaneously.

(LS VOIP Q02): Which of the following protocols are used with VoIP? (Select two answers only. You must have both answers correct for credit. There is no partial credit for this question). SMTP SNMP RTP NTP SIP

RTP SIP VoIP uses the following protocols: (1) Real Time Transport Protocol (RTP) which are the packets that contain the actual voice data, and (2) Session Initiation Protocol (SIP), which is used to set up, maintain, tear down, and redirect the call.NTP is used for synchronizing time between devices. SNMP is used by devices for sending configuration information. And SMTP is used for sending e-mail.

(LS 9_6 SCADA Q23): Which of the following SCADA technology terms connects equipment to the network via a wireless signal and converts a digital data from the network into signals that the equipment can process? Remote Terminal Unit DCS Network Link Supervisory Computer Programmable Logic Controller

Remote Terminal Unit A Remote terminal unit connects the equipment to the network, converting digital data from network into signals that the equipment can process. Most RTUs use wireless connections for communication

(LS 9_6 SCADA Q29): SCADA systems are typically implemented using which of the following components: Channel service units (CSUs) and data service unit's (DSUs). Remote terminal units (RTUs) and programmable logic controllers (PLCs). Link control protocol (LCP) and network control protocol (NCP) Transmission control protocol (TCP) and user datagram protocol (UDP)

Remote terminal units (RTUs) and programmable logic controllers (PLCs). SCADA systems are designed for large-scale networks where the industrial equipment be managed by some distance away from the control center. This is called a Distributed Control System (DCS), which is typically implemented using the following components: * A central supervisory computer. * Remote terminal units (RTUs) * Programmable logic controllers (PLCs) * A network link

(LS 9_1 Storage Q02): Which of the following does not accurately describe an iSCSI SAN? Needs dedicated Ethernet cabling. Can authenticate connections and encrypt data transmissions. Requires special hardware and knowledge to implement. Uses port 3260 by default.

Requires special hardware and knowledge to implement. iSCSI encapsulates SCSI commands within IP packets and transmits them over a standard Ethernet network. ISCSI can be implemented using standard Ethernet hardware and knowledge.

(LS 9_6 SCADA Q28): Which of the following is an example of the smart technology embedded within network devices associated with automated factory equipment? NAS appliances. VoIP systems SCADA systems ICMP

SCADA systems Some examples of smart industrial equipment include Supervisory Control and Data Acquisition (SCADA) systems, which are used to manage automated factory equipment. SCADA systems provide two important functions:* Supervisory control is used to remotely control equipment over a network connection.* Data acquisition is used to gather information from the remote equipment, allowing you to monitor its status.Voice over IP (VoIP) systems are used in unified communications to transmit voice and video over a packet switched network. Network attached storage (NAS) appliances are self-contained storage devices designed to allow clients to store and share files over the network. The Internet Control Message Protocol (ICMP) is used to prevent errors and control information by allowing hosts to exchange packet status information.

(LS VOIP Q03): Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call? NTP SIP RTP SSH TLS

SIP The Session Initiation Protocol (SIP) is used to set up, maintain, tear down, and redirect the call. The Real time Transport Protocol (RTP) which is the second protocol involved with VoIP, and it contains the actual voice data

(LS 9_5 Cloud Q13): Which of the following cloud computing solutions will deliver software applications to a client either over the Internet or on a local area network? IaaS DaaS SaaS PaaS

SaaS Software as a Service (SaaS) delivers software applications to the client over the Internet or on a local area network.Infrastructure as a Service (IaaS) delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments. Client deploys and run software without purchasing servers, datacenter space, or network equipment. Platform as a Service (PaaS) delivers everything a developer needs to build an application onto the cloud infrastructure. The development comes without the cost and complexity of buying and managing the underlying hardware and software layers. Data as a Service (DaaS) stores and provides data from a centralized location without the need for local collection and storage.

(MMv3C17Q06): All of the following are virtual machine managers EXCEPT: VMware Workstation KVM Microsoft Virtual PC Snes9X

Snes9X Snes9X is actually an emulator. The others are virtual machine managers

(LS 9_6 SCADA Q25): Which of the following SCADA technology terms communicates with and sends control commands to connected SCADA devices? Remote Terminal Unit DCS Network Link Supervisory Computer Programmable Logic Controller

Supervisory Computer

(LS 9_6 SCADA Q22): Why do attackers prefer static environment devices to conduct distributed network attacks? Select two answers only. Smart device vendors tend to proactively protect their products against security threats. These devices tend to employ much weaker security than traditional network devices. These devices are typically more difficult to monitor than traditional network devices. These devices are typically installed in the DMZ outside an organization's perimeter firewall. It is difficult to update the virus definitions used to protect these devices

These devices tend to employ much weaker security than traditional network devices. These devices are typically more difficult to monitor than traditional network devices. Attackers prefer static environment devices to conduct distributed network attacks for the following reasons:* They tend to employ much weaker security and are easier to exploit than traditional targets, such as desktops, notebooks, tablets, and smartphones.* Smart device vendors tend to reactively protect their products against security threats, tending only to respond after an exploit has occurred instead of proactively defending their systems.* These devices are typically more difficult to monitor than traditional network devices.Because the devices operate in a static environment, you typically cannot install third-party software on them, including anti-malware scanners. Because of their relatively weak security, these devices should not be deployed in an unsecure area of the network such as the DMZ.

(LS 9_6 SCADA Q30): What is the risk associated with smart technology used in network devices such as smart refrigerators, environmental controls, or industrial equipment? They use redundant paths for fault tolerance which can cause message loops to develop on the network. They are vulnerable to exploits due to weaker security. They are not physically secure, so they can be reconfigured by anyone who has access to that. They are not compatible with routing protocols which causes a burden on network bandwidth

They are vulnerable to exploits due to weaker security. Devices with embedded smart technology are not designed to be customized or directly configured by system administrators. For example, you cannot install anti-malware software on a smart TV. Because of this weaker security, smart technology devices are vulnerable to exploits and attacks.

(LS 9_6 SCADA Q20): You are the manager for the information systems of a large manufacturing firm in San Francisco.Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an Internet connection.You are concerned about the security of these devices. What can you do to increase their security posture? Select two answers only. Install a network monitoring agent on each device. Verify that your networks existing security infrastructure is working properly. Enroll each device in a mobile device management team. Install anti-malware software on each device. Install the latest firmware updates from the device manufacturer

Verify that your networks existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer Since you generally have little or no control over the smart technology embedded within SCADA devices, they are referred to as static environments. As a result, there is typically very little you can do to increase the security posture for these types of devices. For SCADA devices, you may be able to do the following, depending on the device manufacturer:* Install the latest firmware updates from the device manufacturer,* Verify that your networks existing security infrastructure is working properly.Because the devices operate in a static environment, you typically can't install third-party software on them, including anti-malware scanners, monitoring agents, or mobile device management (MDM) agents.

(LS 9_6 SCADA Q21): You are the manager for the information systems of a large datacenter located in Las Vegas.Network environmental controls are used to manage the temperature within the datacenter. These controls use embedded smart technology allowing them to be managed using a mobile device app over an Internet connection.You are concerned about the security of these devices. What can you do in order to increase their security posture? Select two answers only. Install anti-malware software on each device. Rely on the device manufacturer to maintain device security with automated firmware updates. Verify that your networks existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer. Enroll each device in a mobile device management system

Verify that your networks existing security infrastructure is working properly. Install the latest firmware updates from the device manufacturer. Since you generally have little or no control over the embedded technology within smart environmental control devices, they are referred to as static environments. As a result, there is typically very little you can do to increase the security posture for these types of devices. For environmental controls, you may be able to do the following, depending upon the device manufacturer:* Install the latest firmware updates from the device manufacturer.* Verify that your networks existing security infrastructure is working properly.Because these devices operate in a static environment, you typically cannot install third-party software on them, including anti-malware scanners or mobile device management (MDM) agents. Relying upon the device manufacturer for security updates is problematic because they can be slow to take steps to protect their products against security threats, tending only to respond after an exploit has occurred is set of proactively defending their systems.

(MMv3C17Q12): A form of virtualization that eliminates telephone switching hardware is called a: VoIP POTS Virtual PBX ISDN

Virtual PBX A virtual PBX Is software that functionally replaces a physical PBX

(MMv3C17Q09): All of the following are examples of hypervisors EXCEPT: ESX Virtual PC Hyper-V Oracle VM Server

Virtual PC While you have lots of choices when it comes to virtual machine managers, they choices for their real embedded hypervisor's are limited mainly to VMWare's ESX server, and Microsoft's Hyper-V. Oracle does have a hypervisor or VMWare Server that you could purchase as well. In this question, Virtual PC really is not a Hypervisor.Virtual PC virtualizes a standard PC and its associated hardware. Supported Windows operating systems can run inside Virtual PC. Other operating systems such as Linux may run, but are not officially supported, and Microsoft does not provide the necessary "Virtual Machine Additions" (which include essential drivers) for Linux.

(LS Virtual Q03): You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. What type of virtualization should you implement? Virtual Networks Virtual Servers Virtual Desktops Network as a Service (NaaS)

Virtual Servers Server virtualization runs multiple instances of a server operated system on a single physical computer. With server virtualization, you can migrate servers on older hardware to newer computers, or add virtual servers to computers with extra unused hardware resources.Virtual desktops do not provide DHCP services. Virtual networks allow virtual servers and desktops to communicate with each other, and they can also allow communication (via the host operating system) to network devices out on the physical network. Network as a Service (NaaS) servers and desktops that are all virtualized and managed by a contracted third-party.

(LS 9_4 VNetwork Q07): You need to provide DHCP and file share services to a physical network. These services should be deployed using virtualization. Which type of virtualization should you implement? Virtual Servers Network as a Service (NaaS) Virtual networks Virtual desktops

Virtual Servers Server virtualization runs multiple instances of a server operating system on a single physical computer. With server virtualization, you can migrate servers on older hardware to newer computers, or add virtual servers to computers with extra unused hardware resources.Virtual desktops do not provide DHCP services. Virtual networks allow virtual servers and desktops to communicate with each other, and they can also allow communication (via the host operating system) to network devices out on the physical network. Network as a service (NaaS) servers and desktops that are all virtualized and managed by a contracted third-party

(LS Virtual Q01): Which component is most likely to allow physical and virtual machines to communicate with each other? Host Operating System Virtual Desktop VHD Virtual Switch

Virtual Switch Virtual switches allow multiple virtual servers and/or desktops to communicate on virtual network segments and/or the physical network. Virtual switches are often configured in the hypervisor.A virtual hard disk (VHD) is a file that is created within the host operating system and that simulates a hard disk for the virtual machine. A physical machine (also known as the host operating system) has the actual hardware in place on the machine, such as the hard disk drives, optical drive, RAM, motherboard, etc. A virtual desktop is a virtual machine in a software implementation on a computer that executes programs like a physical machine.

(MMv3C17Q08): All of the following are advantages to using virtualization in research and testing environments EXCEPT product testing security testing development testing hardware testing

development testing

(MMv3C17Q22): Which of the following is a type of virtual switching that gives every VM its own physical NIC? virtual bridging dedicated bridging routing NAT

dedicated bridging A subset of bridging is to give every VM its own physical NIC. In this case, you are still bridging, but every virtual NIC goes straight to a dedicated physical neck. This is dedicated bridging.

(MMv3C17Q13): What is another term for a virtual machine? host guest emulator environment

host A virtual machine is sometimes called the "host" A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software emulation or hardware virtualization. In most cases, both are implemented together.

(LS 9_1 Storage Q01): You are in the process of configuring and iSCSI storage area network (SAN) for your network.You want to configure a Windows Server 2012 system to connect to an iSCSI target defined on a different service system. You also need to define iSCSI security settings, including CHAP and IPSec.Which tool should you use? Multipath I/O iSCSI initiator. Internet Storage Name Service. iSCSI under File and Storage Services in Server Manager

iSCSI initiator. Run the iSCSI Initiator to connect to an iSCSI target defined somewhere on the SAN fabric. You can also use this utility to define iSCSI security settings, including CHAP and IPSec.Internet Sturridge Name Service (iSNS) servers provide discoverability and zoning of SAN resources. Multipath I/O (MPIO) provide support for using multiple data paths to a storage device. Use the iSCSI option under File and Storage Services in Server Manager to define and iSCSI target on a server.

(MMv3C17Q30): The practice of hosting machines, processing, or networks at a site other than your location is referred to as: on site offsite centralized decentralized

offsite If a virtual machine is somewhere other than your location you would call it offsite. If your computer is that your location you then call it on-site.

(MMv3C17Q10): All of the following are characteristics of VMware's ESX Server EXCEPT: support for large storage ability to move running VMs automatic fault tolerance requires Linux host OS

requires Linux host OS Features of VMWare's ESX server include: Interface with large storage, transparent fault tolerance, transparent server transfer, and high virtual CPUs. It does NOT require Linux OS host. It can run on other Operating Systems.

(MMv3C17Q21): All of the following are characteristics of Hyper-V EXCEPT: available for free Microsoft product requires Windows Server 2008 simple to use

requires Windows Server 2008 While Hyper-V really can't match up with ESX, it does have many nice features. For one thing it is free. ESX can be quite expensive. It comes as a stand-alone product or as part of Windows Server 2008 and even on some versions of Windows 7 which makes it easy to play and access with. So it really doesn't require Windows Server 2008. Finally, its simplicity makes it easier to learn than trying to use some of the new hypervisor's.

(MMv3C17Q07): Which of the following are important reasons to implement virtualization? (Select only 2 answers.) hardware increases research and testing system recovery system installation

research and testing system recovery Several important reasons to implement virtualization could include Research and Testing, System Duplication, System Recovery, Hardware Consolidation, and Power Saving.

(MMv3C17Q16): A virtual machine that is not powered on is stored as a: hard drive process in RAM set of files snapshot

set of files Set of Files called VDX files

(MMv3C17Q23): Which of the following terms describe a point-in-time backup of a virtual machine? full backup differential backup snapshot system state backup

snapshot Virtual machines don't have a file or a Save equivalent but they do have something which is called a snapshot that does enable you to save an extra copy of the virtual machines as it is exactly at the moment but the snapshot was taken.

(MMv3C17Q17): An advantage of virtualization that enables a VM to be replicated is known as: system restoration system installation system recovery system duplication

system duplication Closely tied to system recovery, system duplication takes advantage of the fact that VMs are simply files, and like any file, they can be copied. So wherever you have a hypervisor, you can copy a single virtual machine to the computer that has a hypervisor.

(MMv3C17Q27): Which of the following requires an underlying operating system in order to create and manage virtual machines? hypervisor Virtual Switch Virtual PBX virtual machine manager (VMM)

virtual machine manager (VMM) Virtual machine manager is the term used to describe virtual machine software that runs on top of a host operating system. If the term hypervisor is used, it only describes software that does not need a host operating system. this question, The VMM requires an operating system so we can manage and create the virtual machines

(MMv3C17Q04): What is the term for an environment created by software, with sight and sound provided by video and audio equipment, primarily used for gaming and simulation? virtual reality virtual machine hypervisor sandbox

virtual reality

(MMv3C17Q01): Which of the following allows all VMs to communicate with each other, the host, and the network? hypervisors virtual switches Virtual PBX Virtual Machine Manager

virtual switches A virtual switch is special software that enables VMs to communicate with each other, without going outside of our system. a good hypervisor such as ESX and Hyper-V) enables you to connect all of your virtual machines to their own virtual switch. Depending upon your hypervisor, this switch can do everything you would expect from a typical managed layer 2 switch, to include building VLANs.

(MMv3C17Q03): Which of the following creates a complete environment for a guest operating system to function as though that operating system were installed on its own computer? emulation translation virtualization polyinstantiation

virtualization In simple terms, virtualization is the process of using special software, a class of programs called hypervisor's or virtual machine managers, to create a complete environment in which a guest op ring system can function as though it were installed on his own computer against environment is called a virtual machine or VM


Related study sets

POSC 432: Criminal Justice Final Exam

View Set

Early Adulthood to Later adulthood Quiz Questions

View Set

ch. 40 Mechanisms of Endocrine Control

View Set

bio 121 clicker questions chapter 6, 8, and 10

View Set

Data Modeling with the Entity-Relationship Model

View Set