Virtual Network Design Midterm

Ace your homework & exams now with Quizwiz!

A NIC can be assigned to more than one virtual switch. True False

False

A virtual machine that is paused on Hyper-V has a saved state, similar to a snapshot, that is reverted to when the virtual machine is resumed. True False

False

Available on both generations of virtual machines, Secure Boot can be used to block unauthorized software and operating systems from running at boot. True False

False

Both versions of the .NET Framework required by the Virtual Machine Manager are installed on Windows Server 2016 by default. True False

False

Hyper-V supports the use of a physical floppy drive within virtual machines, much the same way a physical DVD drive can be used to support discs. True False

False

The Jobs workspace displays the status of all jobs over the past 120 days, and these jobs can be sorted and filtered. True False

False

The VMM Console has a built in restore function for recovering from backups. True False

False

Worms are viruses that are operating at the same privilege as the hypervisor and have methods to hide from detection by anti-virus software. True False

False

Both vSphere 6.0 and Hyper-V provide checkpoint merge capability which allows a snapshot to be applied to a running VM without the need to shut down and restart. True False

True

Diskette drives are only available on generation one virtual machines. True False

True

The VMM console can be installed on different computers throughout a network, but they can only manage one VMM server at a time. True False

True

The network ID is the same for all computers that share a network. True False

True

The reconnaissance phase of an attack occurs from outside of the network. True False

True

VMM can be installed in a different forest than the VMM Management Server, however, this requires a two way trust between the cross forest domains. True False

True

Virtual machine performance suffers without the installation of Integration Services for Hyper-V VMs. True False

True

What is the recommended number of processor cores that should be available for the database server used by VMM? a. 16 cores b. 4 cores c. 8 cores d. 2 cores

a. 16 cores

What is the default port utilized by the VMM Management Server to allow connections by the VMM Console? a. 8100 b. 15692 c. 5986 d. 10000

a. 8100

When using the Hyper-V hypervisor, what is the default mouse release key combination that will transfer mouse control from the VM back to the host? a. Ctrl + Alt + left arrow b. Ctrl + Home c. Ctrl + Alt + Insert d. Ctrl + Enter

a. Ctrl + Alt + left arrow

You are using a network attached storage (NAS) system for virtual machine storage. What protocol can you use with VMware ESXi to access the files on the NAS? a. NFSv3 b. AFP c. CIFS d. SMB

a. NFSv3

What VMware vSphere technology allows you to move not only a running virtual machine to a different vSphere host, but also the files associated with the virtual machines to a different data store? a. Storage vMotion b. VMware DRS c. vMotion d. VMware FT

a. Storage vMotion

When creating a guest OS profile, the identity information is set to "*". What does this mean? a. The guest OS will be assigned a random name. b. The guest OS will allow anonymous logins due to the use of a wildcard. c. The identity information will be copied from the host VMM and used to determine the UUID of the guest. d. The username associated with the guest OS profile is a wildcard, allowing any user to make use of the profile.

a. The guest OS will be assigned a random name.

What happens when the "Delete" link is used from the Actions menu in Hyper-V Manager? a. The virtual machine configuration files are removed, but the virtual disk files are left in place. b. The virtual machine configuration files and virtual hard disks are deleted. c. The virtual machine configuration files are retained, but the virtual disk files are deleted. d. The virtual machine is removed from the list in Hyper-V manager, but both the configuration files and disk files remain intact.

a. The virtual machine configuration files are removed, but the virtual disk files are left in place.

When a virtual machine in Hyper-V is saved from the Action menu, where is the virtual machine's memory and state information saved to? a. They're both saved to a file on the host computer b. They're both saved to the virtual machine's configuration file. c. They're both saved to the virtual machine's virtual hard disk file. d. They're both saved to the guest OS's page file, much like a traditional suspend operation.

a. They're both saved to a file on the host computer

What is the file name used for an answer file for Windows Vista or Windows Server 2008 or newer? a. Unattend.xml b. Unattend.ini c. answer.txt d. Custom.bat

a. Unattend.xml

A user has asked for your assistance in restoring the wizard windows and confirmation messages that they've checked the "Do not show this again" option. Where can this setting be found? a. Under the Hyper-V Settings dialog box, within the "User" section. b. Under the Actions menu, "Reset Check Boxes" option. c. Under the virtual machine settings window, in the "Management" section. d. Under the Hyper-V Settings dialog box, within the "Server" section.

a. Under the Hyper-V Settings dialog box, within the "User" section.

The creation of a baseline for checking if a VMM server has all required patches requires the use of what Microsoft service? a. Windows Server Update Services b. Network Health role c. VMM Monitor role d. Microsoft Baseline Reporting

a. Windows Server Update Services

What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases? a. exploitation phase b. scanning phase c. reconnaissance phase d. pivoting phase

a. exploitation phase

When using the Hyper-V hypervisor, what virtual switch type is the most restrictive, in that it will not allow communication with even the host? a. private network b. internal network c. isolated network d. external network

a. private network

You are assigning user roles to users within your Active Directory environment for use with VMM. What role should you assign a user that needs to manage self-service users as well as create and manage their own virtual machines? a. tenant administrator b. fabric administrator c. self service manager d. delegated administrator

a. tenant administrator

What private IP address range is a Class B private IP range? a. 192.168.1.0 to 192.168.254.0 b. 172.16.0.0 to 172.31.0.0 c. 224.0.0.0 to 254.0.0.0 d. 10.0.0.0 to 10.255.255.0

b. 172.16.0.0 to 172.31.0.0

What statement regarding the use of a generation two virtual machine is accurate? a. A generation two virtual machine will not support a SCSI based DVD drive. b. A generation two virtual machine simulates the newer style EFI firmware. c. Generation two virtual machines support the use of legacy network adapters. d. A generation two virtual machine does not support the addition of an IDE controller.

b. A generation two virtual machine simulates the newer style EFI firmware.

What statement accurately describes a perimeter network location? a. Perimeter networks are networks that are isolated in scope and exist in a separate forest using VMM. b. A perimeter network is a network that is not part of Active Directory. c. A perimeter network is a network in a different area of the Active Directory forest. d. Perimeter networks are networks that have automatically installed the VMM Local Agent via Active Directory.

b. A perimeter network is a network that is not part of Active Directory.

You are about to install a guest OS from a DVD disc. What must you do in order to install the guest OS in a generation two virtual machine? a. Nothing, the default configuration for a second generation virtual machine is to use the physical DVD drive as the source for installation. b. An ISO file must be created from the DVD in order to use it with a generation two virtual machine. c. An IDE controller must be added to the virtual machine, and a DVD player attached to it. d. Map the host's DVD drive to a DVD drive in the virtual machine.

b. An ISO file must be created from the DVD in order to use it with a generation two virtual machine.

What DRS mode has the ability to move VMs to other ESXi hosts based on a preset performance threshold rating, requiring no actions on behalf of an ESXi administrator? a. Preset b. Automatic c. Semi-automatic d. Manual

b. Automatic

What feature, available in Windows 7 and Windows Server 2008 and later allows the guest OS to communicate directly with a hypervisor, for increased features and improved performance? a. Second Level Address Translation (SLAT) b. Enlightened I/O c. Non-Uniform Memory Access (NUMA) d. Transparent Page Sharing

b. Enlightened I/O

When interacting with a virtual machine, what option under the virtual machine tab allows you to sync with Microsoft Azure Site Recovery Vault to provide a failover option? a. Cloud Mirroring b. Manage Protection c. Cloud Sync d. Azure Backup

b. Manage Protection

What virtualization product supports the use of 4-KB disk sectors within virtual drives, allowing the virtual machine to take advantage of increased storage capacity? a. XenWorks b. Microsoft Hyper-V c. Oracle VirtualBox d. VMware vSphere

b. Microsoft Hyper-V

What tool is used to remove computer identification information from a Microsoft OS? a. SCVMM_cln.exe b. Sysprep c. Microsoft Refresh d. System Cleaner

b. Sysprep

How is the iSCSI connection process typically made secure? a. The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled. b. The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key. c. The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption. d. The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.

b. The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.

What statement regarding the VMM management server is accurate? a. The VMM Management Server must be installed on an Active Directory domain controller. b. The VMM Management Server must be installed on a server that is a member of an Active Directory domain. c. The VMM Management Server requires a minimum of 8 GB of RAM. d. The VMM Management Server requires a minimum of 16 GB of RAM.

b. The VMM Management Server must be installed on a server that is a member of an Active Directory domain.

Where should you check to ensure that both the DEP/NX bit and hardware virtualization are enabled for your host machine running Windows Server 2016 Standard? a. The Microsoft Management Console. b. The system BIOS configuration screens. c. Under Control Panel, in the System application. d. Device Manager, under CPU

b. The system BIOS configuration screens.

Where can the settings for the Shielding option on a virtual machine be configured? a. Under the Hyper-V Settings window for a host, in the User section. b. Under the Settings window for the virtual machine, in the Hardware section. c. Under the Settings window for the virtual machine, in the Management section. d. Under the Hyper-V Settings window for a host, in the Server section.

b. Under the Settings window for the virtual machine, in the Hardware section.

What advanced virtual hard disk format, introduced by Windows Server 2012 R2, provides increased storage capacity of up to 64 TB per VM disk, improved performance, and security? a. VMDK b. VHDX c. VDI d. VHD

b. VHDX

What component serves as the core of the vSphere ESXi hypervisor? a. vOS embedded b. VMKernel c. vSphere Core d. vMotion AOS

b. VMKernel

What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline? a. VMware AlwaysOn b. VMware FT c. VMware vMotion d. VMware vCluster

b. VMware FT

What VMware technology is used by VMware FT to keep the secondary virtual machine up to date with the active primary virtual machine? a. VMware vMotion b. VMware vLockstep c. VMware vSync d. VMware VMFS

b. VMware vLockstep

On what operating system is the VMM Local Agent NOT capable of installation? a. Windows 10 b. Windows 7 c. Windows Server 2016 Hyper-V d. VMware ESX Server

b. Windows 7

What Windows OS is not supported by Microsoft for installation within Hyper-V? a. Windows Server 2008 R2 b. Windows 7 Home Edition c. Windows Home Server 2011 d. Windows Vista Professional Edition SP2

b. Windows 7 Home Edition

What statement regarding the installation requirements for Hyper-V is accurate? a. To install Hyper-V, you need a 32-bit or 64-bit version of Windows Server 2016. b. You must have a processor that supports SLAT in order to install Hyper-V. c. Hyper-V does not require the use of a processor with hardware virtualization. d. Hyper-V will not run on a processor with the DEP/NX bit feature.

b. You must have a processor that supports SLAT in order to install Hyper-V.

When using Microsoft Hyper-V, what type of virtual switch should you utilize if you want to limit communication of a virtual machine to only virtual machines running on the host? a. internal virtual switch b. private virtual switch c. local virtual switch d. external virtual switch

b. private virtual switch

Under what menu in the Virtual Machine Connection window can you send a "Ctrl+Alt+Delete" sequence to the guest OS? a. View b. File c. Action d. Edit

c. Action

What statement regarding the use of an IDS is not accurate? a. An IDS can detect a virtual machine that is infected by a worm. b. An IDS can detect a denial of service attack. c. An IDS improves performance of a virtual network. d. An IDS examines all packets on a virtual network.

c. An IDS improves performance of a virtual network.

You are attempting to install a Windows Server 2008 guest OS to a SCSI based drive within a generation one virtual machine, however, you find you are unable to perform the install. What is the reason for this failure? a. Windows Server 2008 does not support the virtual SCSI controller used by generation one VMs in Hyper-V. b. A SCSI based drive can't be added to a generation one virtual machine. c. Generation one virtual machines do not support a non-IDE based boot drive. d. The BIOS of a generation one virtual machine will not recognize the SCSI controller.

c. Generation one virtual machines do not support a non-IDE based boot drive.

You have enabled the "Data Exchange" feature within Integration Services for Hyper-V. What registry key is used to pass information back and forth between the guest and the host? a. HKEY_USERS\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters b. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters c. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters d. HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters

c. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters

What does the Ctrl + Alt + Break key combination do within Hyper-V? a. It performs a paste operation. b. It releases the host mouse and keyboard from the VM's management screen. c. It toggles the use of the Full Screen Mode. d. It pauses the currently selected running virtual machine.

c. It toggles the use of the Full Screen Mode.

What workspace in the VMM Console stores all of the virtualization resources that VMM uses? a. VMs and Services b. Jobs c. Library d. Fabric

c. Library

You are attempting to move a vSphere virtual machine stored in a VMFS formatted iSCSI volume to a workstation running VMware Workstation 12 Pro. What must be done to the VM before it can be moved? a. The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application. b. The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location. c. Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved. d. The virtual disk must be converted to a .vmdk file prior to it being moved from the volume.

c. Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved.

When using a physical graphics card to accelerate video and 3D rendering in a virtual machine, what role must be added to the server? a. 3D Render Host role b. Terminal Services role c. Remote Desktop Virtualization role d. Virtualized Desktop Infrastructure role

c. Remote Desktop Virtualization role

What command should be used to recover VMM SQL data from a backup? a. SCVMM_rec.exe b. vmmrevert.exe c. SCVMMRecover.exe d. VMM_restore.ps1

c. SCVMMRecover.exe

What are the two different types of checkpoints? a. Production and standby b. Primary and secondary c. Standard and production d. Supplemental and tertiary

c. Standard and production

What statement regarding the use of iSCSI networks is not accurate? a. LUNs are connected to a TCP/IP network using one or more Storage Processors. b. Each target must have an iSCSI qualified Name (IQN) or Extended Unique Identifier. c. The iSCSI target is a single physical disk that is assigned a LUN. d. Entities on an iSCSI network are referred to as nodes.

c. The iSCSI target is a single physical disk that is assigned a LUN.

What is used to facilitate the use of virtual machine dynamic memory? a. The virtualization features of the processor are used to overload and compress the amount of physical RAM needed for the dynamic memory. b. The virtual hard disk associated with the virtual machine. c. The smart paging file, which is normally located in the same directory as the virtual machine configuration files. d. A registry entry that enables sharing the host's page file with all guest machines.

c. The smart paging file, which is normally located in the same directory as the virtual machine configuration files.

You have just turned on a virtual machine and after determining that a network issue exists, you discover that the virtual machine is using the IP address of 169.254.141.259, with a subnet mask of 255.255.0.0, and no default gateway has been set. What is the issue? a. The virtual machine is using an IP address in the loopback address range. b. The default gateway should be configured to 169.254.1.1 in order to access the network. c. The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address. d. The virtual machine is using the wrong subnet mask for the class of IP address configured.

c. The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address.

When creating a hardware profile, what do the settings under "Availability" do? a. They determine what users are able to access the profile within VMM. b. They determine the availability of hardware resources that can be dedicated to the virtual machine. c. They determine whether a virtual machine is placed on a server that is a member of a cluster, to provide high availability. d. They limit the access over the network to the virtual machine by deploying it to servers with specific access policies.

c. They determine whether a virtual machine is placed on a server that is a member of a cluster, to provide high availability.

What hypervisor does NOT include a DHCP service for use with virtual machines? a. VMware Fusion b. VMware Workstation c. VMware vSphere d. VirtualBox

c. VMware vSphere

What version of Windows Server 2016 does not include the Hyper-V role? a. Windows Server 2016 Datacenter b. Windows Server 2016 Web c. Windows Server 2016 Essentials d. Windows Server 2016 Standard

c. Windows Server 2016 Essentials

What sort of network policy should you utilize in vSphere if your intent is to limit the amount of bandwidth a virtual machine is allowed to use? a. network NIC teaming policy b. network flow policy c. network traffic shaping policy d. network security policy

c. network traffic shaping policy

What type of malware is a virus that operates at the same privilege as the hypervisor and utilizes various methods to hide from detection? a. worm b. adware c. rootkit d. trojan

c. rootkit

What two versions of the Microsoft .NET Framework must be installed in order for you to make use of VMM? a. .NET 4.0 and .NET 4.5 b. .NET 2.0 and .NET 3.0 c. .NET 3.5 and .NET 4.0 d. .NET 3.5 and .NET 4.6

d. .NET 3.5 and .NET 4.6

What is the recommended number of processor cores that should be available for the database server used by VMM? a. 4 cores b. 8 cores c. 2 cores d. 16 cores

d. 16 cores

What private IP address range is a Class B private IP range? a. 192.168.1.0 to 192.168.254.0 b. 224.0.0.0 to 254.0.0.0 c. 10.0.0.0 to 10.255.255.0 d. 172.16.0.0 to 172.31.0.0

d. 172.16.0.0 to 172.31.0.0

What port should not be assigned to any feature when installing VMM? a. 11245 b. 8631 c. 15892 d. 5986

d. 5986

You are configuring a backup program for a server that hosts Hyper-V based virtual machines. One of your required locations to back up is the folder containing the virtual machine configuration files. Where are these located? a. C:\Users\Public\Documents\Windows\Hyper-V b. C:\Users\Public\Documents\Hyper-V c. C:\Users\Public\AppData\Microsoft\Windows\Hyper-V d. C:\ProgramData\Microsoft\Windows\Hyper-V

d. C:\ProgramData\Microsoft\Windows\Hyper-V

How do virtual COM ports communicate with the host machine on Hyper-V? a. COM ports communicate via special TCP/IP enabled network adapters on the guest and the host. b. The serial ports must utilize a special Microsoft USB driver that passes the traffic on the host's USB bus. c. Communication occurs through a setting in the Windows registry. d. Communication is done through the use of a named pipe.

d. Communication is done through the use of a named pipe.

Under the Fabric ribbon within the Storage node, where can you create a policy that assigns storage classifications to actual performance metrics, such as maximum bandwidth and IOPS? a. Create Storage Performance Policy b. Create Storage Classification c. Create Storage Access Policy d. Create Storage QoS Policy

d. Create Storage QoS Policy

You have established a baseline using Windows Server Update Services, and would like to check the compliance status of all VMM servers. Where can you find this information in VMM Console? a. Under the Settings workspace, go to the "Reports" section, click "View compliance report" b. In the Library workspace, select all servers, right click, select "Show compliance details" c. Under the Jobs workspace, create a new job, select "Check compliance". d. In the Fabric ribbon, on the Servers node, select "Compliance".

d. In the Fabric ribbon, on the Servers node, select "Compliance".

At what point is a Hyper-V host considered to be managed by a VMM instance? a. It is managed only after the server is joined to an Active Directory domain. b. It is managed once the VMM Management Server is installed. c. It is managed once the VMM Management Server is configured to handle all activity on the host. d. It is only managed by VMM after it has been successfully added via the VMM Console.

d. It is only managed by VMM after it has been successfully added via the VMM Console.

What advanced command-line interface serves as a front end for specialized commands, known as cmdlets? a. Windows Bash b. Z Shell c. Command Prompt d. PowerShell

d. PowerShell

When connecting to a virtual machine through VMM Console, what is a valid option for interacting with the guest OS? a. Terminal Services Access (TSA) b. Virtual Network Computing (VNC) c. Remote Buffer Viewer (RBV) d. Remote Desktop (RDP)

d. Remote Desktop (RDP)

What statement regarding the use of IPv4 is accurate? a. The subnet mask is used to determine what networks are public and what networks are private. b. IPv4 utilizes a 128-bit address to communicate on the network. c. IPv4 utilizes a 48-bit address to communicate on the network. d. The 127.0.0.1 address is reserved as a loopback address.

d. The 127.0.0.1 address is reserved as a loopback address.

Under what conditions can you dynamically change the number of vCPUs or memory available to a guest OS? a. The host's hardware must support hot add features via VT-x. b. The host must be using a type-2 hypervisor. c. The guest OS must be installed in a UEFI enabled VM. d. The guest OS must support the dynamic addition of CPUs and memory.

d. The guest OS must support the dynamic addition of CPUs and memory.

What statement reflects a valid approach to improving performance and security on a virtual server that accesses shared storage over the network, in addition to providing networking services? a. The host should be placed in a special VLAN along with the storage to isolate access. b. The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services. c. The host should be configured to use the same virtual network switch for both accessing shared storage and providing services. d. The host should be configured to use separate network adapters for accessing storage and providing services.

d. The host should be configured to use separate network adapters for accessing storage and providing services.

During the installation of VMM, you provided your administrative domain account to the installer as the service account. Now, operations are failing. What is the cause of the issue? a. The service account can't be an account managed by Active Directory, it must be a local account only. b. The service account must be a member of the Enterprise Administrators group in the domain. c. The service account is not meant to be an administrative account, for security reasons. d. The service account should not be the same account you are currently logged into while performing the install.

d. The service account should not be the same account you are currently logged into while performing the install.

Which of the following is NOT considered one of the three major components of the Virtual Machine Manager? a. VMM Management Server b. VMM Local Agent c. VMM Console d. VMM Service Account

d. VMM Service Account

What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline? a. VMware vMotion b. VMware vCluster c. VMware AlwaysOn d. VMware FT

d. VMware FT

A production type checkpoint within Hyper-V utilizes what service in the guest OS to perform the checkpoint? a. Integration Services Checkpoint for Windows b. Background Intelligent Transfer Service c. Windows Backup Service d. Volume Shadow Copy Service

d. Volume Shadow Copy Service

You notice that the last job for a virtual machine you are attempting to work on failed, causing the virtual machine to not start. What is NOT one of the three possible options under repair? a. retry the last job that failed b. return the virtual machine to the state before the failed job c. ignore the job failure d. clone settings and recreate the virtual machine

d. clone settings and recreate the virtual machine

The process of storing a single copy of a data sector and then using reference pointers to access this data from other locations is known by what term? a. sector overloading b. storage tiering c. hard linking d. data deduplication

d. data deduplication

What is the default disk type utilized by the Hyper-V hypervisor? a. differencing disk b. independent disk c. fixed disk d. dynamic disk

d. dynamic disk


Related study sets

Slovesa s genitivem BEZ PREPOZICE, DO, OD, Z, Z-DO

View Set

ECON 2302.1003 CHAPTER 1 OVERLOOK

View Set

Cherry Chapter 22, Ch 20. Ch 21., Cherry & Jacob Ch 17. Nursing Leadership & Management

View Set

Practice Questions / Exam 2 / NUR 113

View Set