VmWare Review Questions
What is a vApp? pg. 411
- A vApp is a container for one or more virtual machines. - A vApp can be used to package and manage multitiered applications."
What connects to TCP/ UDP 902? pg. 117
- Connects ESXi host to client or server
What is the one thing vMotion cannot provide?
- Incompatible CPU's
What is the most important thing you will probably need to know about Network Address Authority (NAA)?
- No two devices will have the same NAA
What is OVF? pg 441
- Open virtual machine format - A collection of items in a single folder
What is OVA? pg 441
- The OVA is the OVF folder contents all zipped into a single file - OVA is a single file
Why can you not use VM snapshots as Backups?
- They are not complete copy of VM
What 3 ways does ESXi provide high security? pg. 50
1) Memory hardening 2) Kernel module integrity 3) Trusted Platform Module (TPM)
What are the 4 components of the vCenter Server architecture? pg. 176
1) vCenter Server 2) The vCenter Server database 3) Active Directory 4) Managed ESXi hosts
Resource pools can be grouped into hierarchies which consist of what two resources? pg. 453
1. CPU 2. Memory
What are the four major categories with system resources? pg 482
1. CPU 2. Memory 3. disk 4. network
What are the four types of ways to migrate? pg. 368
1. Cold - migrate a VM that is powered off 2. Suspended - Migrate a VM that is suspended 3. vSphere vMotion - migrate a virtual machine that is powered on 4. vSphere Storage vMotion - migrate a VM's files while the VM is powered on, to another datastore
VMFS can be deployed on what three kinds of SCSI based storage devices? pg 245
1. DAS 2. FC 3. iSCSI NOT: FCoE
What are the storage technologies that are supported by ESXi hosts in the VmWare vSphere environment? pg. 239
1. Direct Attached Storage (DAS) 2. Fibre Channel (FC) 3. Fibre Channel over Ethernet (FCoE) 4. iSCSI 5. NAS
What are VMware vSphere three layers of memory? pg. 441
1. Host physical memory 2. Guest OS physical memory 3. Guest OS virtual memory
What are the load balancing policies? pg. 199 to 201
1. Ip-Hash 2. Originating virtual port ID 3. Source Mac Hash
What kind of datastore can be created ?
1. NFS 2. VNFS 3. virtual volumes
What two versions of NFS are supported? pg. 246
1. NFS 3 2. NFS 4.1
What are the thee configurable parameters to control a virtual machine's access to a given resource? pg. 451
1. Shares - a value that specifies the relative priority or importance of a virtual machine's access to a given resource 2. Limit - Consumption of CPU cycles or host physical memory cannot exceed this value. 3. Reservation - this value defined in terms of CPU or memory must be available for the virtual machine to start.
Which are the three iSCSI Initiator types? pg. 257
1. Software iSCSI 2. Dependent Hardware iSCSI 3. Independent Hardware iSCSI
You are running virtual machine, running out of space, what needs to be done to get more disk space?
1. expand the VMDK file 2. expand the volume inside.
What is the VMware admission control policy when configuring HA? pg. 581
1. host failure 2. cluster tolerance
What are the two pieces of an iSCSI connection? pg. 255
1. initiator 2. target
What four ways can vSphere HA protect applications availability? pg 550
1. protect against server failure 2. protects against datastore accessibility failure 3. protects against application failures 4. protects virtual machines against network isolation
What are three examples of VMware path selection policies? pg. 296
1. round robin - used for scalability 2. most recently used (MRU) - used for availability 3. Fixed - used for availability
What is the purpose of vCenter serve using admission control? pg 581
1. to ensure sufficient resources are available in a cluster to provide failover protection 2. virtual machine resource reservations are respected
What are the valid user interfaces in a VMware enviroment?
1. vCenter 2. web client (vSphere) 3. CLI 4. DCUI
With a enterprise plus license, what is the max number of CPU for a VM?
128
How many logical CPU can a dual socket, quad core hyper threading processor handle.
16 logical CPU
What is the data frequency in a real time (past hour) collection? pg. 478
20 seconds
What is the maximum number of pieces a content library can hold? pg 425
256
What is the maximum amount of memory available for a virtual machine?
4 TB
What is the maximum size for a virtual disk file in a VMFS datastore? pg. 244
62 TB
What is ballooning? pg 490
Ballooning is a memory reclamation process done by ESXi through a 'balloon driver' [vmmemct1 driver]. Because the guest OS is not aware it is virtual, it is normally not aware of the host's memory situation. Ballooning makes the guest operating system aware of the low memory state of the host by inflating and deflating a balloon of virtual swap space in the hypervisor level. Active only when memory is scarce, ballooning forces VMs to use their own paging areas
What key strokes allows you to do CTRL + Alt + delete?
Ctrl + Alt + insert
When you walk up to an ESXi host and you turn on the monitor, what are you looking at?
DCUI interface
A VMKernel port is required to support which VMware features? pg. 183
Fault Tolerance ESXi Management IP Storage
What happens when a virtual machine is powered on and we cannot meet the reservation?
It will fail (not turn on)
What is vCenter? (two words)
Management software
What is the most important thing to remember when configuring iSCSI? pg. 260
Never share your ISCSI traffic with anything else or any other path.(physical separation preferred) - for performance and security reasons
What are the default Security Policy Exceptions in a VM Network? pg. 194
Promiscuous Mode: Reject MAC Address Changes: Accept Forged Transmits: Accept
When you have a vMotion, and you are moving from one physical host to another host. How can you do this? pg 372
Reverse Address Resolution Protocol (RARP)
What memory management allows pages with identical content to be stored only once? pg. 443
Transparent page sharing
What does the virtual data protection (VDP) appliance protect? pg. 613
VMDK files
Say you were creating a virtual machine, what is the recommended network adapter?
VMXNET3
In order to use VMXNET3, what is required on the virtual machine?
VMware Tools
What is VMM? pg. 51
Virtual machine monitor
How do we manage VMware replication?
Web client
Based on virtual machine MEMORY MANAGEMENT methods, which one requires VMware Tools?
balloon drivers
What is changed block tracking? pg. 70
copies only file blocks changed since last backup Can be used with any type of virtual disk EXCEPT for RDM (Raw device mapping) mode. Must be enabled on each VM
An administrator wants to clone a running virtual machine to the template but cant find the option to do this in the GUI, what is a possible reason for this? a. clone operation is not license b. the array is not VAI compliant c. Cloning and running VM is not supported on GUI d. admin has logged in ESXi host not to vCenter
d. admin has logged in ESXi host not to vCenter
Why would you want to run the VMware on the windows host instead of the vCenter appliance
database has more options on the windows host(heterogenous)
Say you present a new fibre channel LUN, what must be done so the ESXi host can see it? pg 294
host needs to rescan to ensure that host sees the most current storage
What is traffic shaping? pg. 196
is a mechanism for limiting a virtual machine's consumption of available network bandwidth.
When we clone a virtual machine does that need to be powered on or powered off?
it is irrelevant you can hot clone when its powered on.
When vSphere HA performs fail-over and restarts virtual machines on different host, what is the most important thing that is going to take place? pg. 641
its first priority is immediate availability of all virtual machines
What is the ESXi hypervisor called?
kernel
Which mode forces all operations to be performed through DCUI pg. 54
lockdown mode
When using vMotion, what is needed to complete a migration in a single pass? pg. 382
mirror driver
For a standard virtual switch, what kind of traffic can you shape?
outbound traffic only
Let's say you have a folder labeled "Master", within that folder you have another folder labeled "Slave". Now say you placed permission on both Slave folder and Master folder. Which one takes precedence? pg. 169
the permissions apply directly to the object
What is the maximum number of virtual NIC's in a single virtual machine?
up to 10