IST 198 Final Exam Review

Ace your homework & exams now with Quizwiz!

True

By default, the network adapter in Hyper-V Server is configured to get an IP address via DHCP.

False

By default, use of virtual printers within VMware Workstation Player is enabled.

Challenge Handshake Authentication Protocol

CHAP (the acronym for __________________________________________) uses a three-way handshake algorithm to verify the identity of your host and, if applicable, of the iSCSI target when the host and target establish a connection.

secret

CHAP verification is based on a predefined private key, also called a CHAP _____________, that the initiator and target share.

desktop pools

Collections of virtual desktops that are managed by Horizon Connection Server.

routed network

Connects to the Edge gateway and provides virtual machines access to the external network.

Embedded Platform Services Controller

Contains all the support services such as inventory service, log services, and deployment that are used by all instances of vCenter Server.

False

Creating Microsoft VDI complete virtual machines for each user will use considerably less storage space, and deploying a new application across an organization must be done to each individual virtual machine.

True

Creating automatic desktop full clone pools can save a lot of administrative time when you need to create many virtual desktops.

True

Dedicated cloud services are typically used by organizations that require the maximum security such as banks, government, hospitals, and legal firms.

True

With classic virtualization, the trap-and-emulate method was the most practical way to use virtualization.

(a) 0 (b) -1

With hardware-assisted virtualization , the guest OS runs in ring ____[a]____ and the hypervisor in ring ____[b]_____.

Containers

With the Microsoft Azure public cloud computing platform, RemoteApp and __________________ allows users to run individual applications on a wide variety of devices.

Content Delivery Network (CDN)

With the Microsoft Azure public cloud computing platform, what hosts Web objects such as images and text as well as software and documents across a global network of high bandwidth servers?

True

With the software iSCSI initiator, you can use iSCSI technology without purchasing specialized hardware.

serial

With vCenter Server, a license key is a(n) _____________ number that corresponds to a product.

True

You can run multiple virtual machines by starting additional instances of VMware Workstation Player as you did in the chapter activities.

True

You do not need to supply a product key when installing Hyper-V Server.

Fault tolerance

____[a]____ ____[b]____ (or FT) focuses mostly on preventing single point of failure by having redundant components that allow a system to continue working despite the failure of any one component.

Disaster Recovery

____[a]____ ____[b]____ as a Service (DRaaS) offers the ability to have a replicated data center in a remote location.

Binary

___________ translation is used to allow otherwise non-virtualizable x86 system calls to be trapped.

Recovery as a Service

A cloud-based disaster recovery service is known as what type of service?

Direct Console User Interface

A console interface that can be used to interact with an ESXi server host.

PC over IP

A display protocol designed to work efficiently with high definition graphics by compressing and sending pixels using similar means to HDTV.

True

By default, VMware Workstation Player suspends it's virtual machine when you exit the program

Raw Device Mapping

A file stored in a VMFS volume that acts as a proxy or go-between providing a physical storage device to virtual disk mapping.

False

A VMFS iSCSI based data store can't be dynamically expanded due to the nature of the VMFS file system structure.

UEM

A VMware Horizon component that can automate moving user profiles between desktop profiles across virtual desktop systems

role

A __________ provides a way to aggregate all individual privileges that are required to perform a higher-level task in vCenter Server

True

A benefit to application virtualization is the ability to tie applications to users versus the more traditional approach of installing applications into desktop images.

application virtualization

A form of packaging an application that isolates the application's files from the underlying operating system, preventing interference among applications.

cloud computing

A form of processing that provides on-demand services based on a virtualized set of resources that are independent from the physical location you are in.

HBA

A hardware based iSCSI initiator.

machine blueprint

A modeling specification used by vRealize for a virtual, cloud, or physical machine.

extent

A partition on a storage device (called a LUN in iSCSI terminology).

VMkernel

A software iSCSI initiator is VMware code built in to the ______________.

4,088

A standard vSphere virtual switch can have a maximum of ________ ports.

native

A type-1 hypervisor, also known as bare metal or _____________, runs directly on the host and doesn't require an operating system

Replication

A vSphere __________ appliance can copy virtual machines to another location, within or between clusters, and makes that copy available for recovery.

thin-provisioned

A way to make the most of your data store capacity by allowing for overallocation.

(a) full (b) incremental

A(n) ____[a]____ backup backs up all files and folders on the system being backed up, resetting all the archive bits to off. A(n) ____[b]____ backup backs up only new files or files that have changed (archive bit on) since the last backup; Once completed it's sets the archive bits to off.

differential

A(n) _______________ backup backs up only the files changed since the last full backup took place but leaves the archive bit set on.

(a) nested (b) extended

AMD and Intel have added features to their processors to help memory mapping overhead in the form of ___[a]___ paging tables (NPT) and ___[b]___ page tables (EPT)

(a) AMD-V (b) Intel VT

AMD's hardware virtualization is called AMD Virtualization (or ____[a]____). Intel's version is called Intel Virtualization Technology ( or ____[b]____). Note: use proper acronyms as presented in reading

A RARP request is sent to notify the network that the MAC is now on a new port.

After a virtual machine that has been moved using vMotion comes online, what method is used to notify a network segment that the MAC address for the VM's IP address is now on a different port?

datastore

After configuring VDP, you can create backup jobs that consist of one or more virtual machines to be backed up to the VDC _____________.

Thick Provision Eager Zeroed

Allocates the space required for a virtual machine during creation. Data remaining on the physical device is zeroed out when the disk is created.

vCloud Director

Allows an organization to host their own cloud environments that may be used by internal or external consumers to build virtual data centers using the organization's local vSphere environment.

switch policies

Allows the administrator to set up rules and procedures to manage how virtual network resources are used.

Differencing Disks

Also called linked clones, which are generated from a parent machine but only contains a subset of the files needed to make it a unique user environment.

protection

An Operating System uses hierarchical protection domains, or ____________ rings, to control access to the CPU.

True

An RDM is recommended when a virtual machine must interact with data on the actual local disk on a SAN.

vlance

An emulated version of the AMD 79C970 PCnet32 NIC

isolated network

An internal only network that does not connect to the network, similar to a host only network.

Raw Device Mapping

An option in VMware server virtualization environment that allows a guest operating system to store data directly on a the host computer's storage (local or SAN):

GUI

As Hyper-V Server doesn't have a ______________, you must perform all configurations through the command prompt window.

trunk port

As an example, this is used by a physical switch to pass packets from multiple VLANs to a host using VLAN tags.

access control system

Authorization to perform tasks in vCenter Server is governed by a(n) ________________________ that allows the vCenter Server administrator to specify in detail which users or groups can perform which tasks on which objects

False (Azure Site Recovery offers three different modes of failover: Test, Planned, and Unplanned.)

Azure Site Recovery offers three different modes of failover: Test, Maintenance, and Unplanned.

cloud

Azure Site Recovery provides similar functionality as Hyper-V replicas but eliminates the need for a second on-premises data center by using the _______.

Stacks

Azure _____________ combines the best of the Private Cloud and Azure, allowing corporations to run most of Azure's cloud services within their own private datacenters.

True

Because instant clones are created in memory, they do not require any disk storage.

True

Both VMware vCloud and Microsoft Azure are generally classified as IaaS cloud platforms.

True

Both vSphere and Hyper-V allow for virtual switches that can provide alternate paths using multiple network adapters.

Virtual Machines

By default (install), VMware Workstation Player will use the Documents\_________________________ folder to store virtual machine files.

static discover

Describes the condition in which an initiator knows in advance all the targets that it will contact and uses their IP addresses and domain names to communicate with them.

administrator@domain_name

During installation, the vCenter Server appliance sets up a Single Sign On account using what username?

True

ESXi host roles are confgured simialr to vCenter Server roles.

gateway

Each VMkernel port must be configured with its own IP address and _____________.

Offline Data Transfer service

Facilitates the transfer of large amounts of data securely from vSphere datacenters to vCloud air.

True

Failover Clustering is built into Windows Server 2016 (and newer) itself and allows multiple servers to be grouped, or clustered, together into different nodes.

3

For CPU access, ring ___________ is where all user applications (such as web browsers and word processing software) run.

(a) target (b) IP

For software based iSCSI adapters, ESXi supports CHAP on a per-____[a]____ level. After the connection is established, the initiator transmits SCSI commands over the ___[b]___ network to the target service.

True

Hardware-assisted virtualization eliminates the need for translation and the extra overhead it entails

They are authenticated against Microsoft Active Directory.

How are users authenticated using the connection server for VMware Horizon Virtual Desktop Infrastructure?

A combination of both routed and isolated networks can be used to establish a DMZ.

How can you create a DMZ-like zone within a virtual data center using vCloud Air?

6

How many archive logs are maintained for a VSphere hosted virtual machine at any one time?

True

Hyper-V Replicas create live copies of running virtual machines on secondary Hyper-V servers.

capacity

If a vSphere Virtual Machine thin disk needs more space, it can expand to the maximum ________________ allocated to it

synchronized

If an organization has two or more virtual data centers, they can use vSphere Replication to keep virtual machines in both locations _____________.

False

If the peak bandwidth parameter is set, a port might gain a burst bonus if it does not use all its allocated bandwidth.

False

If vCenter Server is installed on a Windows-based machine, that install must be an Active Directory server.

hostd

If you are using the vSphere Client to communicate directly with an ESXi host, communications go directly through which process?

mobile

Implementing BYOD often requires additional network and computer resources to run the virtual machines needed to support _________ devices.

False

Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller.

On a NAS or SAN

In a VDI environment, where are virtual desktop VMs typically stored?

template

In a manual full clone pool, the virtual desktops VMs are created from a _____________ and then configured and added to the pool individually.

(a) snapshots (b) switches

In addition to backing up ____[a]____, both VMware and Microsoft provide specialized backup services that allow you to back up virtual machines along with other objects such as ____[b]____ and hypervisor configurations.

(a) 1 (b) 0

In full virtualization, the guest OS runs in ring ____[a]____ and the hypervisor in ring ____[b]_____.

False

In order to maintain a responsive and low risk environment for virtual machines, a host's CPU and memory should remain below 70-80% utilization.

True

In paravirtualization, the guest OS is modified to work with the hypervisor.

hardware

In paravirtualization, the guest OS makes hypercalls directly to the host __________.

System audit Mode

In the Sysprep utility, what option allows applications and drivers to be installed and is used to test the installation?

True

In the case of a failed VDP appliance, the datastore from the failed VDP can be reattached to another copy of VDP.

True

In vCenter Server, a role is a collection of privileges

video

Input/output MMU allows devices such as ________ cards, Ethernet adapters, and hard drive controllers direct access to memory to increase performance.

agent software

Installed on each virtual desktop and communicates to a client running on a user's computer.

non-persistent

Instant clones are considered _________________ as they are deleted from memory after the user ends their session.

high availability

Keeping services available and online 24/7 has become a major requirement for many organizations The term ____[a]____ ____[b]____ describes a service's capability to continue despite the loss of a system or site.

Compute

Match the Openstack component categories with their descriptions: Define the standards for the Hypervisor and associated modules need to run virtual machines

Control

Match the Openstack component categories with their descriptions: Responsible for managing the configuration and authorization in the OpenStack environment

Network

Match the Openstack component categories with their descriptions: Used to connect internal components as well as provide gateways to external networks

Storage

Match the Openstack component categories with their descriptions: Used to store virtual machines, images, databases, and message files

Manage

Match the VMware Workstation Player > Player menu options to their functions: - change virtual machine settings - display message logs - install VMware tools

Removable Devices

Match the VMware Workstation Player > Player menu options to their functions: - connect a host USB device

File

Match the VMware Workstation Player > Player menu options to their functions: - create a new virtual machine - open an existing virtual machine - download a virtual appliance - change Preference options

Unity

Match the VMware Workstation Player > Player menu options to their functions: - run virtual machine applications on the host computer - requires VMware Tools on the guest OS

Help

Match the VMware Workstation Player > Player menu options to their functions: - search for topics based on key words

Send Ctrl+Alt+Del

Match the VMware Workstation Player > Player menu options to their functions: - send the Ctrl+Alt+Del key sequence to the currently running guest OS

Power

Match the VMware Workstation Player > Player menu options to their functions: - turn on or shutdown a Guest - suspend a Guest - restart a Guest

Full Screen

Match the VMware Workstation Player > Player menu options to their functions: - use the workstation's full screen

1. Tiny 2. Tiny 3. Small 4. Small 5. Medium 6. Medium 7. Large 8. Large

Match the VMware vCenter Server Appliance 6.0 environments to their corresponding specifications: 1. up to 10 hosts 2. up to 100 Virtual Machines 3. up to 100 hosts 4. up to 1,000 Virtual Machines 5. up to 400 hosts 6. up to 4,000 Virtual Machines 7. up to 1,000 hosts 8. up to 10,000 Virtual Machines

Connects users to virtual machines

Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Connection Broker

Enables secure access to virtual machines over the Internet

Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Gateway

Manages the licenses authorizing use of operating systems on virtual desktops

Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Licensing

Manages the Hyper-V servers that will be hosting the virtual machines

Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Virtualization Host

Allows users to easily access their virtual machines from a browser

Match the five major components that make up the Microsoft Virtual Desktop Infrastructure to their respective descriptions: RD Web Access

(a) master (b) profile

Microsoft VDI Virtual machines in a pooled virtual desktop collection all share the same _____[a]_____ image. Any changes made to the virtual machine are reverted when the user logs off. Only the user _____[b]_____ is stored.

False

Microsoft Virtual Machine Manager can provide support for only a single private cloud.

True

Microsoft offers Hyper-V Server at no cost.

x86

Modern processors from Intel and AMD have support for hardware virtualization, which essentially gives trap-and-emulate capabilities of classic virtualization to the _________ platform.

open

Modifying an OS to support paravirtualization is easy on an ____________ source OS, such as Linux.

False

NIC teaming policies are set for an entire standard switch, and cannot be changed at the port group level.

True

NIC teaming policies enable you to determine how network traffic is distributed between adapters and how to reroute traffic in the event of an adapter failure.

load-balancing

NIC teaming policies include ________________________ and failover settings.

1. Reject 2. Accept 3. Accept

Network security policies allow the administrator to set the following security exceptions: Match each security exception to it's default value: 1. Promiscuous Mode 2. MAC Address Changes 3. Forged Transmits

True

Network switch policies can be defined for a entire virtual switch, individual port, or port groups.

ClarityUI

Newer versions (7.5 and 8.x) of vRealize have switched to a ________________ dashboard.

False

No vCloud account is required in order to set up a vCloud virtual data center (VDC), although it is preferred.

dynamic discovery

Occurs when an initiator uses SendTargets requests to find iSCSI targets on a host automatically.

private cloud

Often used by large organizations that are required to store their data within on-premise data centers, this provides the ability for an organization to service consumers and users with on-demand IT services and resources.

1. Obtain a vCloud Air account 2. Create a virtual data center along with any necessary virtual machines 3. Install vConnector in the existing vSphere environment 4. Connect the local vSphere data center to the vCloud virtual data center

Properly order the four steps involved in extending a data center with vCloud Air:

connection broker

Provides a way to connect thin clients to their assigned virtual desktops based on username and then manages and tracks these connections in a database for auditing and control purposes.

edge gateway

Provides routing and firewall services to connect internal virtual networks to the External or public network.

The settings on the port will have priority, because the policy is overridden at the port level.

Scenario: A security policy has been applied to an individual port on a virtual switch. The switch itself has a conflicting policy configured. What setting has priority?

The MAC address changes and forged transmits policies should be set to "Reject".

Scenario: A virtual machine providing services for your network was recently hacked. The virtual machine was used to spoof MAC addresses on your network to target other systems. What policies could you set to prevent this from reoccurring?

The "Assign uplink" icon should be selected after the NAT network adapter is added.

Scenario: You are adding a new ESXi host and configuring a NAT adapter While adding a you receive a warning that one or more hosts have no assigned physical network adapters What should be done?

Your ISP or router is blocking the use of port 445 outside your local network.

Scenario: You are attempting to map a drive letter to a Microsoft Azure File Storage cloud share, but the attempt fails with errors. What is most likely the issue, given the problems presented?

cold migration

Scenario: You are attempting to migrate a virtual machine to a different host The new host has an Intel processor The old host has an AMD processor What type of migration must be performed?

The RD Web Access service is using a self-signed certificate.

Scenario: You are attempting to open the RD Web Access page You receive a security warning that the web site is not trusted. What is most likely the cause?

A network security policy is preventing the use of a promiscuous mode interface.

Scenario: You are attempting to utilize a packet capturing software in your studies of a network's traffic. However, your virtual machine running on vSphere is unable to put the network adapter in promiscuous mode. What is the most likely reason for the failure?

The organizational unit the VMs will be placed in.

Scenario: You are configuring Microsoft RDS and have come to the Active Directory configuration page. Besides being able to select the domain for deployment, what other option should you configure on this screen?

The e1000 adapter type will be used, because it is the default for 64-bit guest operating systems.

Scenario: You are configuring a Linux based 64-bit virtual machine for use on a vSphere host. Based on this information, what will be the default network adapter type and why?

%windir%\system32\sysprep\sysprep.exe

Scenario: You are preparing a Windows 10 virtual machine template and need to prepare the VM.. Where can you find the Sysprep utility?

traffic shaping policy

Scenario: You are trying to support a VOIP application on a virtual machine, and need to prioritize VOIP traffic. What kind of virtual switch policy should you use?

The adapter has been manually configured to a speed of 100 Mb, duplex operation.

Scenario: You are using a gigabit Ethernet adapter (vmnic1) on an ESXi host You have found that the status screen displays the adapter as being connected at 100 Mb, full duplex. You have verified that the switch your server connects to has 1 Gbps capable ports. What is most likely the problem?

Machine Learning

Scenario: You have been tasked with deploying a cloud based Microsoft Azure service that creates predictive analytics models. What Azure service should you use?

The Edge Gateway is blocking all incoming ports.

Scenario: You have deployed a Virtual Private Cloud service and configured a routed network for your VM. After deploying you find that you are unable to access any ports assigned to services on the VM. What is most likely the issue?

The static target was added via dynamic discovery, and a rescan operation has re-added it.

Scenario: You remove a static software-based iSCSI target. You then discover hours later that the target has been returned to the list of targets. What is the most likely cause?

Enhanced vMotion migration

Scenario: You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use?

VMware ESX Citrix XenServer Microsoft Hyper-V

Select the type-1 hypervisors listed below:

PostgreSQL Server

Smaller organizations can use which of the following vCenter Server's built-in database to manage data center objects?

software iSCSI initiator

Software that handles iSCSI processing while communicating with the network adapter, allowing for the use of iSCSI targets without special hardware.

True

Some VMware license keys can be split by applying them to multiple assets.

Thick Provision Lazy Zeroed

Space required for a virtual disk is allocated during creation, but data remaining on the physical device is not erased during creation, it is zeroed out over time.

Remote Desktop Services

The Microsoft technology, formerly known as Terminal Services, that now encompasses Virtual Desktop Architecture and Session Desktops.

lossless

The PCoIP protocol is a __________________ protocol by default, providing a display without losing any definition or quality.

Enterprise Integration

The Service Bus and StorSimple services on Microsoft Azure fall under what Azure cloud service category?

Out-of-Box Experience

The System _________________________ (OOBE) option in SysPrep allows for tasks such as creating user accounts and naming the computer like a new PC installation.

True

The VMware connector allows administrators to migrate computing resources across vSphere and vCloud environments.

False

The VMware vCloud Connector is a paid add-on tool help organizations to create fully functional hybrid cloud environments.

True

The Virtual Network Editor is not included in the free VMware Workstation Player package.

tenancy

The Virtual Private Cloud service is a multi-______________ service in that multiple organizations will share the same hardware that is logically divided into separate virtual data centers.

Horizon Connection Server

The central component of the Horizon Virtual Desktop Infrastructure.

RDS

The combination of Session Virtualization and VDI

True

The dedicated cloud account is more expensive than the Virtual Private Cloud account.

False

The e1000 network adapter is an emulated version of the Intel 82574L Gigabit Ethernet NIC.

True

The kernel of an OS runs in protection ring 0.

External Platform Services Controller

The name for when the platform services controller is installed on a separate server from the vCenter Server.

vmxnet3

The next generation of a paravirtualized NIC, designed for performance and advanced features such as fault tolerance.

portlets

The original vRealize user dashboard contained _______________ (also called frames) that show a variety of information

overallocation

The process of assigning more disk space to virtual disks that you have space available on a VMFS data store.

(a) agent (b) administrative (c) vCenter

The roles of the Horizon Connection Server include the following: Manage connections between Horizon clients and Horizon-managed desktops running the Horizon ____[a]____ software. Authenticate user connection requests and provide access to assigned desktops. Host the Horizon ____[b]____ console. Work with VMware ____[c]____ to manage, deploy, and maintain virtual desktops.

False

The vCenter Server Linux appliance has a built-in MySQL database that can be used instead of a Microsoft SQL server.

Web Client, Inventory database service, Syslog services, Auto Deploy service

The vCenter services include the vCenter Server itself and what other services?

(a) multiqueue (b) offloads (c) interrupt

The vmxnet3 adapter offers all the features available in vmxnet2 and adds several features, like _____[a]_____ support (called Receive-Side Scaling in Windows), IPv6 _____[b]_____, and MSI/MSI-X _____[c]_____ delivery.

True

There are two major types of pools that can be created by VMware Horizon: full clone pools and linked-clone pools.

capacity

Thin provisioning can be configured to provide alarms and reports to track current usage of storage _______________.

deduplication

Thin provisioning is often used with storage array ___________________ to improve storage use and to backup virtual machines.

e1000

This network adapter is an emulated version of the Intel 82545EM Gigabit Ethernet NIC, with drivers available in most newer guest operating systems, including Windows XP and later and Linux versions 2.4.19 and later.

Preferences

To change a VMware Workstation Player virtual machine's exit behavior and configure settings for online updates, click the ________________ option from the File menu

sconfig

To reopen the Hyper-V Server > Server Configuration window, from command prompt type the ______________ command

False (Type-2 hypervisors are user applications that run on top of another operating system, such as Windows or Linux)

Type-1 hypervisors are user applications that run on top of another operating system, such as Windows or Linux

False

USB devices can be connected directly to an ESXi host computer.

A lock file can exist when a virtual machine is stored on an NFS based data store.

Under what conditions might a virtual machine have a lock file?

Catalog

Under what tab in the original vRealize Automation dashboard will a user be able to deploy services that they have been entitled to?

Requests

Under what tab in the original vRealize Automation dashboard will a user review service histories in vRealize Automation?

6

Up to _______________ additional replica connection servers can be installed in a single Horizon VDI environment.

personal virtual desktop collection

Used by VDI to assign individual virtual machines to users that serve as their own private, persistent desktops.

Thin Provision

Uses only as much data store space as the disk initially needs.

False

Using ANS vCloud Air provides a high capacity SSL VPN that can be used by individual devices such as laptops and mobile phones to connect securely into a vCloud Air environment using SSH certificates.

(a) export (b) encrypted

Using ODT, you can _____[a]_____ your data to an external storage device that is provided by a vCloud Air operator. The data is then _____[b]_____ and stored on the external storage device, which you then ship back to the operator.

True

Using VSS within VDP allows applications running on virtual servers to quiesce data before the backup. This is most commonly done when backing up Microsoft Exchange email servers.

(a) on-premises (b) portal

Using the vCloud Connector, organizations can connect and manage virtual machines in their ____[a]____ datacenters with a VMware-backed public cloud using a single vCloud Connector ____[b]____.

VMware vRealize Automation

What VMware vCloud suite component provides self service and policy based infrastructure, and provides on-demand cloud services to consumers through the use of catalogs?

VMware vRealize Operations

What VMware vCloud suite component provides tracking VM usage statistics for managing resource allocation?

virtual machine VMkernel uplink

What are the different types of ports that exist on a virtual switch?

(a) hybrid (b) applications (c) capacity

Using vCloud Air to extend a data center has several advantages: Extend Existing Applications: A major advantage of implementing a _____[a]_____ cloud is migrating applications from your existing data center to vCloud Air without having to make any major changes in the application or data center to provide consistent security and accessibility. Test & Development: Another important advantage of extending the data center using a hybrid cloud is utilizing cloud capacity for development and testing of new _____[b]_____. Web & Mobile Applications: Using a hybrid cloud provides the ability to deliver mobile Web applications over vCloud Air while still providing limited access to your on-premises data center. Cloud-Hosted Desktops: Delivery of desktops and hosted apps as a cloud service can provide end users on any device, anywhere, with needed _____[c]_____ without compromising the dedicated resources of your local data center.

True

VDI agent software communicates through the connection broker.

Data protection

VDP uses the vSphere Storage APIs for ____[a]____ ____[b]____ (VADP) in order to back up other running virtual machines without requiring special backup software within the guests being backed up.

protected

VMware FT eliminates this downtime by keeping a second copy of __________ VMs running on other hosts in the cluster, allowing VMware FT to instantly move VMs to a new host.

True

VMware Virtual appliances have the benefit of being fully configured for a specific application.

True

VMware Workstation 12 Player can be a standalone product that can be downloaded and installed on most Windows and Linux systems.

True

VMware Workstation Player allows use of shared folders from the host computer (with proper configuration).

True

VMware Workstation Player is included with VMware Workstation.

False

VMware Workstation Player is limited to running two guest VMs in each Player instance.

False

VMware Workstation Player supports snapshots and cloning.

True

VMware Workstation Player virtual machines can communicate with each other through their virtual network adapters.

User Environment Management

VMware provides a ___________________________________ component that can automate the setup of roaming user profiles across virtual desktop systems.

True

VMware vSphere 6 provides support for USB 3.0 devices in virtual machines.

pooled virtual

VMware's instant clone desktop feature is known as _________________ desktops in Hyper-V. (two word answer)

True

Virtual Private Clouds are much more economical than dedicated cloud services.

8

Virtual machines running on a free vSphere hypervisor can have up to _______ virtual CPUs.

128

Virtual machines running on a licensed vSphere hypervisor can have up to _______ virtual CPUs.

RA-GRS

What Azure File Storage replication strategy supports replication across multiple facilities as well as the ability to read data from primary or secondary locations?

Digital Rights Management

What Microsoft Azure cloud service does not fall under the Security and Identity category?

Visual Studio Application Insights

What Microsoft Azure cloud service provides developers with the ability to track application crashes and usage?

RD connection broker

What Microsoft VDI component is responsible for balancing performance by choosing virtual machines from different servers when possible?

Pay-as-you-go

What NIST defined cloud characteristic allows consumers to pay only for the resources they use?

Elasticity

What NIST defined cloud characteristic allows resources to be managed by the consumer and quickly scaled out to provide more capability or quickly scaled in to release unneeded capacity?

Broad network access

What NIST defined cloud characteristic describes access to services over the network using a Web browser and standard interfaces from any location with a variety of devices including desktop, laptop, and tablet computers?

On-demand self-service

What NIST defined cloud characteristic describes the ability for consumers to quickly provision virtual machines with the hardware and software resources they need without waiting for outside assistance?

Resource pooling

What NIST defined cloud characteristic describes the ability to group resources and make them available to users on demand in a shared, multi-tenant fashion?

Reliability and redundancy

What NIST defined cloud characteristic provides the capability for redundancy and fault tolerance through the use of virtual machines, as well as load balancing and disaster recovery?

Nova

What OpenStack component serves as the standard hypervisor that interacts with other modules that make up a cloud environment?

non-persistent desktops

What VDI solution makes it possible for a school environment to provide virtual desktops that are returned to their original state when they are signed out?

instant clone

What VMware Horizon feature allows virtual desktop clones to be created on the fly from a running parent VM?

VMware vRealize Business

What VMware vCloud suite component provides automated costing, usage metering, and service pricing of virtualized infrastructure for vSphere environments?

VMware vRealize Operations

What VMware vCloud suite component provides performance, capacity, and configuration management for vSphere environments?

True

With a Microsoft VDI personal virtual desktop collection, users can install their own applications and have full administrative access.

1. The initiator finds one or more targets and establishes a connection 2. A target presents LUNs to the initiator 4. The initiator sends SCSI commands to a target

What are the steps undertaken by an initiator in order to connect to an iSCSI target (in order)?

vSphere Web client and vSphere Client

What are the two GUI clients provided by VMware for use with vSphere?

RemoteApp and App-V

What are the two application virtualization packages available through Microsoft?

ThinApp and Vapp

What are the two application virtualization packages available through VMware?

A connection can be made over the public Internet or an IPSec VPN can be utilized.

What are the two different options available for connecting vCloud Air and your vSphere data center?

DCUI and vCLI

What are the two major console interfaces used to work with an ESXi host?

vicfg-user -u

What command can you use to add a comma separated list of users to an ESXi server using VCLI?

RD session host

What component of RDS provides server desktops as Terminal Services did rather than virtual machines?

Server2019.rdm.vmdk

What configuration file name would be assigned to the RDM pointer file for a VM named Server2019?

MSSQL

What database is not available as a choice for use with OpenStack?

It provides hybrid storage, combining cloud storage for less frequently accessed data and local storage for high performance needs.

What functionality does the StorSimple Azure cloud service provide?

The guest OS partition layout

What guest operating system information does not typically require modification when creating a template?

No users are able to log into ESXi hosts, they must authenticate with vCenter Server.

What happens when ESXi hosts are put into lockdown mode?

BusMQ

What is NOT one of the popular message buses utilized as a storage component for OpenStack?

BusLogic SAS

What is NOT one of the valid choices available for ESXi's virtual SCSI adapter?

A SAN is more costly to implement.

What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)?

The iSCSI traffic should be isolated to a dedicated and separate network.

What is a valid step that should be taken to make using iSCSI technology on a network more secure?

Virtual machine image management

What is not one of the items defined by the control components of OpenStack?

License service, VMware Certificate Authority, Lookup service, vCenter Single Sign On

What is part of the VMware platform services component of vCenter Server?

You are creating a small group of customized desktops.

What is the best use case for deploying a manual full clone pool?

2 TB

What is the default amount of storage that is provided when using the vCloud Air Virtual Private Cloud subscription?

The connection server

What is the major component that is required in order to implement a basic VMware Horizon Virtual Desktop Infrastructure?

2000

What is the maximum number of clients that a Horizon connection server can handle?

32

What is the maximum number of extents that can be added to any VMFS data store?

4 GB RAM

What is the minimum requirement for RAM required in order to run the Horizon Connection Server?

Glance

What is the name of the virtual machine image management component used by OpenStack?

Windows Server 2012

What is the oldest recommended version of Windows Server that should be used to host the Horizon Connection Server?

Advanced Networking Services

What is the vCloud Air equivalent of the VMware NSX software defined networking environment?

A three-way handshake and private keys

What is used by CHAP to verify the identity of a host?

Storage vMotion migration

What kind of migration allows a powered-on virtual machine to be moved to a new data store?

RD Gateway

What optional Microsoft VDI component provides secure internet access to virtual machines without requiring a VPN?

hostd

What process is responsible for managing most of the operations on an ESXi host?

It is the OpenStack frontend to a set of agents that manages Networking as a Service using the Software Defined Networking infrastructure.

What role does the Neutron component of OpenStack serve?

A network monitoring application such as an intrusion detection system (IDS)

What sort of application might require the promiscuous mode security policy to be configured to "accept" in order to support?

Virtual desktop systems must be domain members.

What statement is accurate regarding the use of virtual desktops with VMware Horizon 7?

A minimum of 40 GB of hard disk space must be available.

What statement regarding the Horizon Composer (verions 7.12) requirements is accurate?

VMware vCenter Server Appliance: requires two CPU cores minimum.

What statement regarding the VMware vCenter Server Appliance 6.0 hardware requirements is accurate?

RDS cannot be installed onto a Domain Controller.

What statement regarding the deployment of Microsoft RDS is accurate?

Desktop pools can be moved between hosts based on host availability and performance

What statement regarding the use of desktop pools is accurate?

A distributed switch can be shared among multiple associated vSphere hosts, providing consistent network configuration.

What statement regarding the use of distributed switches is accurate?

A VMFS data store can be expanded as long as there is free space available in the extent.

What statement regarding the use of iSCSI extents is accurate?

The root user is still able to log in via the DCUI console.

What statement regarding the use of lockdown mode is accurate?

Security Server can be installed on a server that is independent of Active Directory.

What statement regarding the use of the VMware Horizon Security Server is accurate?

The vpxa process serves as an intermediary between the vpxd process and the hostd process.

What statement regarding the vpxa process is accurate?

object

What term is used to describe an entity upon which actions are performed in vCenter Server?

privilege

What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server?

root object

What term is used to describe the top most object in the vCenter Server inventory?

peak bandwidth

What traffic shaping policy option determines the max number of kilobits per second to allow across a port when it is sending a burst of traffic?

burst size

What traffic shaping policy option determines the max number of kilobits to allow in a burst?

average bandwidth

What traffic shaping policy option determines the number of kilobits per second to allow across a port, averaged over time?

Virtual Desktop Access (VDA) and Software Assurance (SA)

What two items are managed by the use of the RD Licensing VDI component?

cold migration

What type of migration involves a virtual machine that is powered off to a different shared data store or data store that is accessible by only one host?

standard

What type of virtual switch exists only within a single vSphere hypervisor?

thin provision

What virtual disk file type can expand to the maximum capacity allocated to it?

thick provision eager zeroed

What virtual disk file type can take advantage of VMware vSphere Fault Tolerance?

thick provision eager zeroed

What virtual disk file type takes the longest to create?

VM_name.vmss

What virtual machine configuration file holds the virtual machine's snapshot state information?

vmxnet3

What virtual network adapter type should you use if you need to support fault tolerance as well as record/replay for network traffic?

vMotion

When HA is enabled in a cluster, if an ESXi host in the cluster fails or is brought down for maintenance, the virtual machines on that host are moved to another host in the cluster using _____________.

True

When a virtual machine attempts to make a system call to the kernel, a hardware fault or error is generated in the CPU.

It is replaced by a .vmtx template configuration file.

When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file?

Multiple network adapters should be used in each host, and should be attached to separate physical switches.

When configuring a VDI environment, how can network redundancy be accomplished?

Distributed Resource Scheduler (DRS)

When creating a cluster of ESXi hosts: What option can be used to increase performance of virtual machines on the cluster by balancing processing loads between hosts?

generator

When managing Disaster Recovery with Virtualization, many organizations have a __________________ as a backup power system to allow them to continue operations for some limited time in the event of a major power failure.

--vihost

When running the vmkfstools command with the --server option pointing to a vCenter Server system, what option should be used to select the proper ESXi host to run the command against?

False

When updating software for linked clones, all linked clones must be manually updated, including the parent.

adapter

When using hardware-based HBA, ESXi supports CHAP authentication at the _____________ level

vCenter Server

When using the Horizon virtual desktop system, what serves as the central management component for administrating the virtual data center?

vpxa

When you are logged on to the vCenter Server system using the Web Client, vCenter Server passes commands to the ESXi host through the ___________ process.

translation lookaside buffer

With CPU MMUs, a built-in cache called the ___[a]___ ___[b]___ ___[c]___ is used to increase speed by storing frequently accessed memory locations.

query

With Hyper-V Server, to see a list of all active drivers, enter the following command: sc _________ type= driver | more

remotely

With Hyper-V Server, you must manage virtual machines ___________ using Hyper-V Manager or Microsoft Virtual Machine Manager.

power

With Microsoft Replica Server, you can perform a planned failover when you need to perform routine server maintenance on your primary server, or anticipate a loss of _________ such as from scheduled utility work or incoming bad weather.

Change

With VMware Workstation Player, you can use the _______ Settings button located under the Devices section of the Preferences window to allow guest virtual machines to access the host printers.

Shadow

______________ page tables map memory addresses between guest OS virtual memory and host physical memory directly.

asset

license keys that are managed and monitored from vCenter Server using the Web Client. License information can be viewed by product, license key, or ____________.

(a) Inventory (b) Auto Deploy

vCenter services include the vCenter Server itself, the Web Client, an _____[a]_____ database service, the _____[b]_____ service, and Syslog services.

True

virtualization software must be able to handle system calls made by guest OSs running on virtual machines.

memory management units

x86 CPUs use internal ___[a]___ ___[b]___ ___[c]___ to build page tables that translate virtual memory addresses to locations in physical memory.


Related study sets

Multiplication and Division 0 - 12

View Set

Chapter 23 Communicable Diseases

View Set

Module 4 - Macro Measures of the Economy and the Business Cycle

View Set

CompTIA IT Fundamentals Domain 3 Study Guide

View Set

Medicare and Long-Term Care Insurance

View Set