Intro to Virtualization
In vSphere which port is dedicated to traffic management? Select one: a. VMKernel Port b. vmnics c. Management Port d. Uplink Port
VMKernel Port
Which two settings must be enabled for Enhanced Session Mode to run? Select one: a. "Use Enhanced Session Mode" and "Allow Enhanced Session Mode" b. "Allow Enhanced Session Mode" and "Run Enhanced Session Mode" c. "Local Enhanced Session Mode" and "Use Enhanced Session Mode" d. "Remote Enhanced Session Mode" and "Allow Enhanced Session Mode"
a. "Use Enhanced Session Mode" and "Allow Enhanced Session Mode" The settings both need to be enabled to run "Enhanced Session Mode" in HYPER-V
The VHD file location, by default is on which drive? Select one: a. C Drive b. D drive c. E Drive d. B Drive
a. C Drive
Which command will verify if the CPU supports Second Level Address Translation (SLAT) technology ? Select one: a. Coreinfo -v b. Netstat c. ipconfig d. Nmap
a. Coreinfo -v The command will verify if CPU supports both hardware-assisted virtualization and SLAT.
What is a bare-metal hypervisor? Select one: a. In a bare metal hypervisor the hypervisor software is installed directly onto the server hardware and no host operating system involved. b. Bare-metal hypervisors are obsolete and not available anymore. c. In a bare metal hypervisor the hypervisor software is made available in simple metallic drives. d. In a bare metal hypervisor software can be installed directly onto the operating system involved.
a. In a bare metal hypervisor the hypervisor software is installed directly onto the server hardware and no host operating system involved. vSphere ESXi hypervisor is a bare metal hypervisor. The hypervisor software can interact directly with the server's physical hardware without going through a host operating system first.
Which database is used for a vCenter Server? Select one: a. PostgreSQL. b. Oracle RDBMS. c. IBM DB2. d. MySQL.
a. PostgreSQL. A special distribution of the Open Source PostgreSQL database that has been optimized for vSphere is used for a vCenter Server.
In case of natural disaster like flood, which type of vSphere replication should be considered? Select one: a. Site to site deployment b. End to client Deployment c. End to End deployment d. Same site deployment
a. Site to site deployment Site to site deployment provides a degree of fault tolerance should something happen that incapacitates the source site, such as a flood.
Which of the following services are provided by cloud implementation? Select one: a. Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Security as a service (SECaaS). b. Software as a Service (SaaS), Operating Service as a Service (OSaaS), Infrastructure as a Service (IaaS) and Security as a service (SECaaS). c. Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Housekeeping as a service (HKaaS). d. Software as a Service (SaaS), Platform as a Service (PaaS), Database as a Service (DaaS) and Security as a service (SECaaS).
a. Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Security as a service (SECaaS).
Which of the following is __false__? Select one: a. The Snapshot hierarchy is always linear. b. A snapshot saves the current power state of the VM. c. In a Snapshot delta disk is created and stored in the hypervisor's datastore that is linked to the virtual machine's base virtual hard disk file. d. A snapshot saves the state of all the virtual machine's virtual hard disks.
a. The Snapshot hierarchy is always linear.
Which of the following is NOT a configurable parameter for a XenServer VM hardware set up? Select one: a. The number of users who can access the VM at a time. b. The number of vCPUs assigned to the VM. c. The priority of the VM. d. The amount of vRAM available for the VM
a. The number of users who can access the VM at a time.
How does the vSwitch function in XenServer virtual environment? Select one: a. The vSwitch in XenServer, receives frames and forwards them to the appropriate ports. b. The vSwitch in XenServer, acts as a network filter and allows only valid frames to reach the appropriate ports. c. The vSwitch in XenServer, is connected to the VM through a physical cable and can work as a backup in case one of the VMs stop functioning. d. The vSwitch in XenServer allows VMs to access other physical machines depending on access rights.
a. The vSwitch in XenServer, receives frames and forwards them to the appropriate ports. The vSwitch in XenServer receives frames and forwards them to the appropriate port. If the frames received are addressed to another VM, then they are forwarded to the appropriate VIF connected to the destination VM.
What are the valid editions of XenServer? Select one: a. The valid editions of XenServer are Free, Standard and Enterprise. b. The valid editions of XenServer are Open Source, Standard and Enterprise. c. The valid editions of XenServer are Free, Dynamic and Enterprise. d. The valid editions of XenServer are Free, Standard and Custom.
a. The valid editions of XenServer are Free, Standard and Enterprise.
What is the function of Virtual Switches in XenServer? Select one: a. Virtual switches are used to create virtual networks in XenServer and there is no physical infrastructure involved. b. Virtual switches are used to create virtual networks in XenServer and though no physical hardware is required sometimes network cables may be required. c. Virtual switches are used to create virtual networks in XenServer and though no physical hardware is required, sometimes network adapters may be involved in the creation of these switches. d. Virtual switches are used to create virtual networks in XenServer and require minimal hardware to be created in the virtualised environment.
a. Virtual switches are used to create virtual networks in XenServer and there is no physical infrastructure involved. Virtual switches in XenServer act like physical switches and do not need any hardware.
Which network interface will serve as an uplink connection to the physical network? Select one: a. vmnics b. Physical NICs c. Virtual Switch Port d. Virtual Switch
a. vmnics
How Many switch types does vSphere supports? Select one: a. 1 b. 2 c. 3 d. 4
b. 2 vSphere supports two different types of vSwitches
What is a hybrid cloud computing implementation? Select one: a. A hybrid cloud is a combination of private, and community cloud resources from different service providers. b. A hybrid cloud is a combination of public, private, and community cloud resources from different service providers. c. A hybrid cloud computing implementation is not feasible. d. A hybrid cloud is a combination of public and private cloud resources from different service providers.
b. A hybrid cloud is a combination of public, private, and community cloud resources from different service providers. The goal behind a hybrid cloud is to expand the functionality of a given cloud service by integrating it with other cloud services.
In cloud computing implementation, what is the difference between a private cloud and a community cloud? Select one: a. A private cloud can be accessed by authorized users within the organization only and a community cloud can be accessed by anyone of the public. b. A private cloud can be accessed by authorized users within the organization only and a community cloud is shared by several organizations. c. A private cloud can be accessed by authorized users within the organization only and a community cloud can be accessed by commercial enterprises only. d. A private cloud can be accessed by all users within the organization only and a community cloud is shared by several organisations.
b. A private cloud can be accessed by authorized users within the organization only and a community cloud is shared by several organizations. A private cloud can be accessed by authorized users within the organization only and a community cloud is shared by several organizations. In a private cloud, access is restricted to users who belong to the organizations that share the community cloud infrastructure.
What is used to capture the state of a Hyper-V virtual machine at a particular point in time? Select one: a. Differencing Disks b. Checkpoints c. Pass-Through Disks d. VHD
b. Checkpoints Checkpoints are used to capture the state of a Hyper-V virtual machine at aparticular point in time. In earlier versions of Hyper-V, checkpoints were referred to assnapshots. Both terms refer to the same thing.
vdSwitch is defined at which level? Select one: a. Network Level b. Datacenter level c. Host Level d. Application level
b. Datacenter level
In XenServer parlance, what is Fast Clone? Select one: a. In Fast Clone, XenServer uses the existing virtual machine as a base and links it to a writable removable disk and the new virtual machine uses the removable disk to write the changes instead of the original hard disk file. b. In Fast Clone, XenServer uses the existing virtual machine as a base and links it to a writable delta disk and the new virtual machine uses the delta disk to write the changes instead of the original hard disk file. c. In Fast Clone, XenServer uses the a new virtual machine as a base and links it to a writable web based drive disk and the new virtual machine uses the web based drive to write the changes instead of the original hard disk file. d. In Fast Clone, XenServer uses the existing virtual machine as a base and links it to a writable solid-state drive and the new virtual machine uses the solid state drive to write the changes instead of the original hard disk file.
b. In Fast Clone, XenServer uses the existing virtual machine as a base and links it to a writable delta disk and the new virtual machine uses the delta disk to write the changes instead of the original hard disk file. Using the Fast Clone option a new VM is created very quickly because very little data is actually copied.
Which of the following is __false__ about Cross-Server Private Network in the XenServer network? Select one: a. The Cross-Server Private Network allows all the VMs running on the hypervisors to be connected to the same distributed switch. b. In a Cross-Server Private Network network administration is complex and requires a high level of skill. c. In Cross-Server Private Networks a distributed switch can encompass multiple XenServer hypervisors. d. In a Cross-Server Private Network the VMs connected to the cross-server private network can communicate with each other.
b. In a Cross-Server Private Network network administration is complex and requires a high level of skill. The key advantage of a cross-server private network is actually makes network administration much easier.
What is vNIC in XenServer network terminology? Select one: a. It is the virtual network inverter card (vNIC) assigned to the virtual machine. b. It is the virtual network interface card (vNIC) assigned to the virtual machine. c. vNIC is not a valid component for XenServer networks d. It is the visual network interface card (vNIC) assigned to the virtual machine.
b. It is the virtual network interface card (vNIC) assigned to the virtual machine.
vSphere replication appliance is a preconfigured virtual machine based on which OS? Select one: a. Windows b. Linux c. MACOS d. ARM
b. Linux The vSphere Replication Appliance is a pre-configured 64-bit Linux virtual machine.
In which Hyper-V switch can a virtual machine NOT communicate with the host hypervisor? Select one: a. Internal vSwitch b. Private vSwitch c. External vSwitch d. Fiber channel vSwitch
b. Private vSwitch In Private vSwitch a virtual machine cannot communicate with the host hypervisor, nor can it communicate on the physical network. This is a useful when creating an environment for testing.
Which option selected during the import process will cause Hyper-V to run the virtual machine from a target location? Select one: a. Wipe the Virtual machine b. Restore the virtual machine c. Register the virtual machine in place d. Copy the virtual machine
b. Restore the virtual machine "Restore the virtual machine" causes all of the virtual machine files to be copied from the storage device into a target location on the local hypervisor.
Which of the following is __false__? Select one: a. The Platform Services Controller (PSC) provides authentication services for vSphere components through the vCenter Single Sign-On. b. The Platform Services Controller (PSC) provides an interface for managing a deployment using a web browser. c. The Platform Services Controller (PSC) provisions each ESXi hypervisor registered with the Platform Service Controller with a security certificate with the help of the VMware Certificate Authority. d. The Platform Services Controller (PSC) creates a common license inventory for all vCenter Servers that are connected to the same Platform Services Controller with the help of License service.
b. The Platform Services Controller (PSC) provides an interface for managing a deployment using a web browser. Web browsers are provided by vSphere Web Client which is part of vCenter Server Group of Services.
Which statement is *true*? Select one: a. The folders of VMware vSphere can have a maximum of 5 subfolders. b. The folders of VMware vSphere have subfolders to help group and manage objects better. c. Subfolders can be created in VMware vSphere only they have been configured to have subfolders during installation. d. The folders of VMware vSphere cannot have subfolders.
b. The folders of VMware vSphere have subfolders to help group and manage objects better. The subfolders help group and manage objects however, the subfolders must contain the same type of objects as the parent folder.
Which of the following is *true*? Select one: a. Both Type 1 and Type 2 hypervisor installed directly on the hardware. b. Type 1 hypervisors are installed directly on the hardware whereas Type 2 hypervisors are installed on an Operating System c. Both Type 1 and Type 2 hypervisor installed on an Operating System. d. Type 1 hypervisors are installed on Operating systems whereas Type 2 hypervisors are installed directly on the hardware.
b. Type 1 hypervisors are installed directly on the hardware whereas Type 2 hypervisors are installed on an Operating System The main difference in the type of hypervisors is how they are set-up.
What are three options for accessing a vSphere virtual machine? Select one: a. Remote Web plugin, VMware Remote Console or configuration of a remote access solution within the guest operating system. b. Web Console, VMware Remote Console or configuration of a remote access solution within the guest operating system. c. Web Console, Web Application or configuration of a remote access solution within the guest operating system. d. Web Console, VMware Server Console or configuration of a remote access solution within the guest operating system.
b. Web Console, VMware Remote Console or configuration of a remote access solution within the guest operating system.
vSphere Replication Appliance is packaged in which file format? Select one: a. ZIP b. RAR c. .OVF d. .htm
c. .OVF
Hyper-V supports how many types of virtual switches? Select one: a. 2 b. 3 c. 4 d. 1
c. 4
vSphere Replication Appliance is prepackaged with how much vRAM? Select one: a. 10 Gb b. 6 Gb c. 8 Gb d. 16 Gb
c. 8 Gb
What is vCenter Server Appliance? Select one: a. A virtualization infrastructure created by Citrix Xen Server, which allows virtual machines and hypervisors in the organization to be managed as a single system. b. A virtualization infrastructure created by Microsoft Hyper-V, which allows virtual machines and hypervisors in the organization to be managed as a single system. c. A virtualization infrastructure that allows virtual machines and hypervisors in the organization to be managed as a single system using the vCenter Server. d. A web browser for managing virtual machines and hypervisors in the organization.
c. A virtualization infrastructure that allows virtual machines and hypervisors in the organization to be managed as a single system using the vCenter Server. vCenter Server Appliance is a virtualization infrastructure that allows virtual machines and hypervisors in the organization to be managed as a single system. vCenter Server can be downloaded from VMware's web site.
Which of the following families of CPU processors is best suited for Hyper-V? Select one: a. Intel Core I5 b. AMD Rayzen c. AMD EPYC or Opteron d. Intel Core I9
c. AMD EPYC or Opteron Hyper-V should be installed in a server grade CPU like Intel Xeon, AMD EPYC or Opteron.
How does DHCP Guard prevent a virtual machine from being used as a rogue DHCP Server? Select one: a. Blocking DHCP release packet b. Blocking DHCP ACK packet c. Blocking DHCPDISCOVER packet d. Blocking DHCP RST packet
c. Blocking DHCPDISCOVER packet Enabling DHCP Guard in a virtual machine's configuration, won't prevent it from responding to DHCPDISCOVER broadcasts on the network. Thus stopping a virtual machine from being used as a rogue DHCP Server.
Which of the following needs to be disabled in order for VHD file format conversion to be completed between different formats in Hyper-V? Select one: a. VHD b. Pass-Through Disks c. Checkpoints d. Differencing Disks
c. Checkpoints Checkpoints needs to be disabled in order for VHD file conversion. VHD file has checkpoints associated with it. If it does, the checkpoints must first be deleted, and then these options will become available.
Which option will prevent a virtual machine from being used as a rogue DHCP Server? Select one: a. Router Guard b. NIC Teaming c. DHCP Guard d. Port Mirroring
c. DHCP Guard "DHCP Guard" will prevent a virtual machine from being used as a rogue DHCP Server.
What are the minimum requirements for supporting RemoteFX? Select one: a. Directx 12 or later support and WDDM 1.2 or later driver support b. Directx 10 c. DirectX 11.0 or later support d. Directx 9
c. DirectX 11.0 or later support
What is Dom0 in the context of XenServer? Select one: a. Dom0 is a special Linux virtual machine that can be purchased separately with XenServer. b. Dom0 is a server for load balancing that is installed automatically when XenServer is deployed. c. Dom0, or Control Domain, is a special Linux virtual machine that is installed automatically when XenServer is deployed. d. Dom0 is a free software for disk partitioning and optimizing available with XenServer.
c. Dom0, or Control Domain, is a special Linux virtual machine that is installed automatically when XenServer is deployed. Dom0, or Control Domain, is a special Linux virtual machine that is installed automatically when XenServer is deployed. It is designed to have a small footprint and to be as transparent as possible.
One of the two ways of accessing the vSphere VM console from within the guest operating systems is to ________. Select one: a. Enable Remote Desktop in the Windows guest OS or create a Web application in the Android OS. b. vSphere VM console cannot be accessed from with the guest operating system. c. Enable Remote Desktop in the Windows guest OS or configure VNC or SSH access within the Linux guest OS. d. Enable Remote Desktop in the Windows guest OS or through a shell program in the UNIX guest OS.
c. Enable Remote Desktop in the Windows guest OS or configure VNC or SSH access within the Linux guest OS.
By default, Hyper-V replication occurs how frequently? Select one: a. Every 12 Minutes b. Every 8 Minutes c. Every 5 Minutes d. Every 10 Minutes
c. Every 5 Minutes
Which method would you use to create a vSphere virtual machine? Select one: a. Manually creating a new virtual machine, cloning an existing virtual machine or downloading a new virtual machine from the Web. b. vSphere does not allow creation of a virtual machine at all. c. Manually creating a new virtual machine, cloning an existing virtual machine or deploying anew virtual machine from a template. d. Manually creating a new virtual machine, creating a virtual machine by remotely connecting to another existing VSphere setup on a different hardware or deploying a new virtual machine from a template.
c. Manually creating a new virtual machine, cloning an existing virtual machine or deploying anew virtual machine from a template.
Which option will prevent a virtual machine from becoming a rogue router? Select one: a. Port Mirroring b. Bandwidth management c. Router Guard d. NIC Teaming
c. Router Guard "Router Guard" will a virtual machine from becoming a rogue router.
In Hyper-V Replication, which replica is a secondary copy that will be kept in an offline state? Select one: a. Backup Replica b. Primary Replica c. Secondary Replica d. Hot Swappable Replica
c. Secondary Replica
Which of the following are not valid options in the console XenServer console Tab? Select one: a. The Undock option and the Remote Desktop mode. b. The Fullscreen mode and the turn on Remote Desktop option. c. The Unlock option and the Remote Desk mode. d. The Undock option and the full Screen mode.
c. The Unlock option and the Remote Desk mode. While Remote Desk mode is a valid option, the Unlock option is not a feature of the console tab.
The following components can be configured for a vSphere VM? Select one: a. The number of Operating Systems, the amount of vRAM, number of additional storage devices, which virtual switch the VM's network board is connected to and number of virtual hardware devices b. The number of vCPUs, the amount of vRAM, number of additional storage devices, which virtual switch the VM's network board is connected to and number of users that can remotely connect to a virtual machine. c. The components that can be configured for a vSphere are: the number of vCPUs, the amount of vRAM, number of additional storage devices, which virtual switch the VM's network board is connected to, and number of virtual hardware devices. d. The number of vCPUs, the amount of vRAM, number of additional storage devices, which virtual switch the VM's network board is connected to and number of Web Services.
c. The components that can be configured for a vSphere are: the number of vCPUs, the amount of vRAM, number of additional storage devices, which virtual switch the VM's network board is connected to, and number of virtual hardware devices.
Type 2 hypervisors are typically used in - Select one: a. High performing business applications that require restricted access. b. Mobile applications that can be easily available. c. Type 2 hypervisors are limited for use in desktops. d. High performing network applications that mandate restricted access.
c. Type 2 hypervisors are limited for use in desktops.
Which of the following is __false__ about XenServer Tools? Select one: a. XenServer Tools make it easier to manage the VM. b. XenServer Tools provide special device drivers and services that the guest OS can load to support the virtual hardware found within the VM environment. c. XenServer Tools can help optimize the performance of a VM. d. XenServer Tools enhances the performance of the virtual machine's guest operating system.
c. XenServer Tools can help optimize the performance of a VM.
Which of the following is __false__ about XenServer System Requirements? Select one: a. XenServer requires hardware virtualization enabled (VT-x or AMD-V). b. XenServer requires at least one SAS, SCSI, or SATA storage device. c. XenServer requires a 64-bit x86 CPU with at least two cores. d. XenServer requires 2 GB of system RAM (minimum). Feedback
c. XenServer requires a 64-bit x86 CPU with at least two cores.
When you install an ESXi hypervisor, which standard vSwitch is automatically created? Select one: a. vSwitch1 b. vSwitch3 c. vSwitch0 d. vSwitch2
c. vSwitch0
How many instances of retention does vSphere Replication allows? Select one: a. 15 b. 5 c. 10 d. 24
d. 24 vSphere Replication allows you to configure retention of up to 24 instances of the replicated VM from multiple points in time.
What is a Single-Server Private Network in XenServer network? Select one: a. A Single-Server Private Network in XenServer is a restricted access network. b. A Single-Server Private Network in XenServer is an open source network. c. A Single-Server Private Network in XenServer is a type of sandbox network that can only be access by the users in a community network only. d. A Single-Server Private Network is a type of sandbox network, isolated from the physical network that can only be used by the VMs running on the same XenServer host to communicate with each other.
d. A Single-Server Private Network is a type of sandbox network, isolated from the physical network that can only be used by the VMs running on the same XenServer host to communicate with each other.
Which of the following is not a valid option for a new virtual machine on a XenServer hypervisor creation? Select one: a. Deploy a new virtual machines from a custom template. b. Manually create a new virtual machine and then install the guest operating system within it. c. Copy an existing virtual machine. d. A new virtual machine cannot be created on a XenServer hypervisor.
d. A new virtual machine cannot be created on a XenServer hypervisor.
VMware Player, VMware Workstation and Oracle VirtualBox are typical examples of? Select one: a. Names of OS that can run Type 1 hypervisors. b. Application used for setup of Type 2 hypervisors. c. Anti-virus software compatible with Type 2 hypervisors. d. Commonly used Type 2 hypervisors.
d. Commonly used Type 2 hypervisors. VMware Player, VMware Workstation and Oracle VirtualBox are commonly used Type 2 hypervisors.
Which generation of virtual machine allows you to utilize virtual UEFI firmware ? Select one: a. Generation 3 b. Generation 1 c. Generation 4 d. Generation 2
d. Generation 2 Modern generation 2 virtual machines enable utilization of UEFI firmware.
What is a full cloud-based deployment? Select one: a. In a full cloud-based virtualization deployment, the cloud infrastructure is hosted on a remote secure server. b. All cloud implementations are hybrid and there is no full cloud implementation. c. In a full cloud-based virtualization deployment some of the virtualization environment is hosted on-premise, while the rest is hosted by a cloud provider. d. In a full cloud-based virtualization deployment, the cloud provider hosts the entire virtualization infrastructure.
d. In a full cloud-based virtualization deployment, the cloud provider hosts the entire virtualization infrastructure. In a full cloud-based virtualization deployment, users utilize an Internet connection to access the services and data hosted by cloud-based virtual machines and use a web-based interface provided by the cloud vendor to create and manage the VMs.
VMware vSphere ESXi, Microsoft Hyper-V and Citrix XenServer are instances of - Select one: a. Names of Hardware Systems that run Type 2 Hypervisors. b. Names of Operating Systems that run Type 1 Hypervisors. c. Names of common Type 2 Hypervisors. d. Names of common Type 1 Hypervisors.
d. Names of common Type 1 Hypervisors.
Which following technology is used by Hyper-V for data corruption? Select one: a. Checkpoints b. Differencing Disks c. VHD d. Pass-Through Disks
d. Pass-Through Disks To prevent data corruption, the physical storage device used for the pass-through disk must first be set to an offline state using Disk Management in the Hyper-Vhost operating system.
Which Hyper-V replica must be shut down before starting the planned failover in Hyper-V? Select one: a. Hot Swappable Replica b. Backup Replica c. Secondary Replicaterm-21 d. Primary Replica
d. Primary Replica The primary replica must be shut down before starting the planned failover.
Selecting which option during the import process will cause Hyper-V to run the imported virtual machine from its current location? Select one: a. Copy the virtual machine b. Restore the virtual machine c. Wipe the Virtual machine d. Register the virtual machine in place
d. Register the virtual machine in place
What are the key components of a XenServer deployment? Select one: a. The Citrix XenServer client and a Citrix XenCenter management host. b. The Citrix XenServer hypervisor and a Citrix XenCenter re-installation setup. c. The Citrix XenServer client and a Citrix XenCenter re-installation setup. d. The Citrix XenServer hypervisor and a Citrix XenCenter management host.
d. The Citrix XenServer hypervisor and a Citrix XenCenter management host.
Which of the following statements is __false__ about cloud-based virtualization? Select one: a. A cloud-based virtualization setup can be deployed in a short time. b. The datacentre can scale up and down dynamically in a cloud-based virtualisation. c. Control of the information and date is reduced in a cloud-based virtualisation. d. The data location can be pinpointed easily in a cloud-based virtualisation.
d. The data location can be pinpointed easily in a cloud-based virtualisation. This statement is false. As the cloud provider hosts all of the VMs, the physical location may not be known easily. Feedback
How is XenCenter installed? Select one: a. To install XenCenter, the appropriate installer is shipped in a zip drive from Citrix and the installer run on the management host. b. To install XenCenter, the appropriate installer licence has to be purchased from a third-party vendor and run on the management host. c. The XenCenter is set up automatically with the XenServer. d. To install XenCenter, the appropriate installer from Citrix's web site has to be downloaded and run on the management host.
d. To install XenCenter, the appropriate installer from Citrix's web site has to be downloaded and run on the management host.
Which module would you enable to allow the guest Windows operating system to encrypt the virtual machine disk using BitLocker? Select one: a. Shielding b. VHD c. Secure Boot d. Trusted Platform Module
d. Trusted Platform Module Trusted Platform Module (TPM) makes a TPM chip available to your virtual machine,and allows the guest Windows operating system to encrypt the virtual machine disk using BitLocker.
What are the main advantages of Type 1 Hypervisor? Select one: a. Type 1 hypervisors cost less are and easy to use. b. Type 1 hypervisors are more widely available. c. Type 1 hypervisors provide easy access and are widely available. d. Type 1 hypervisors offer better performance and are more secure.
d. Type 1 hypervisors offer better performance and are more secure. Type 1 hypervisors typically offer better performance than Type 2 hypervisors because the overhead associated with a host operating system isn't a factor and are more secure.