0% found this document useful (0 votes)
5K views

MCQs

This document provides a 10 question multiple choice quiz about virtualization technologies. The questions cover topics such as characteristics to consider when deploying virtual machines, situations describing too many virtual machines without oversight, approaches to maintain optimal hardware resource utilization over time, ways to reduce management effort of a lab environment while enabling quicker deployments, and strategies for testing software with intermittent defects in a virtual machine. The quiz tests knowledge of key virtualization concepts regarding server deployment, management, provisioning, and software testing.

Uploaded by

NIRMALYA_NJRCS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5K views

MCQs

This document provides a 10 question multiple choice quiz about virtualization technologies. The questions cover topics such as characteristics to consider when deploying virtual machines, situations describing too many virtual machines without oversight, approaches to maintain optimal hardware resource utilization over time, ways to reduce management effort of a lab environment while enabling quicker deployments, and strategies for testing software with intermittent defects in a virtual machine. The quiz tests knowledge of key virtualization concepts regarding server deployment, management, provisioning, and software testing.

Uploaded by

NIRMALYA_NJRCS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 29

Cloud Computing Questions and Answers – Virtualization

Technologies
This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on
“Virtualization Technologies”.

1. Which of the following correctly represents different types of mobile patterns ?

a)

b)

c)
d) All of the mentioned
View Answer
Answer: a
Explanation: You can define the features in software and hardware that enables flexibility as
conforming to one or more of the mobility patterns.
2. Point out the wrong statement :
a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
b) Virtualization assigns a logical name for a physical resource and then provides a
pointer to that physical resource when a request is made
c) All cloud computing applications combine their resources into pools that can be
assigned on demand to users
d) All of the mentioned
View Answer
Answer: c
Explanation: Several important cloud computing approaches use a strictly hardware-based
approach to abstraction.
3. Which of the following type of virtualization is also characteristic of cloud computing ?
a) Storage
b) Application
c) CPU
d) All of the mentioned
View Answer
Answer: d
Explanation: To enable these characteristics, resources must be highly configurable and flexible.
4. The technology used to distribute service requests to resources is referred to as :
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned
View Answer
Answer: c
Explanation: Load balancing is an optimization technique.
5. Point out the correct statement :
a) A client can request access to a cloud service from any location
b) A cloud has multiple application instances and directs requests to an instance based
on conditions
c) Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
d) All of the mentioned
View Answer
Answer: d
Explanation: Alternatively, systems can be virtualized through load-balancing technologies.
6. Which of the following software can be used to implement load balancing ?
a) Apache mod_balancer
b) Apache mod_proxy_balancer
c) F6’s BigIP
d) All of the mentioned
View Answer
Answer: b
Explanation: Load balancing can be used to increase utilization and throughput, lower latency,
reduce response time, and avoid system overload.
7. Which of the following network resources can be load balanced ?
a) Connections through intelligent switches
b) DNS
c) Storage resources
d) All of the mentioned
View Answer
Answer: d
Explanation: Load balancing provides the necessary redundancy to make an intrinsically
unreliable system reliable through managed redirection.
8. Which of the following is a more sophisticated load balancer ?
a) workload managers
b) workspace managers
c) rackserve managers
d) all of the mentioned
View Answer
Answer: a
Explanation: They determine the current utilization of the resources in their pool.
9. An ______ is a combination load balancer and application server that is a server
placed between a firewall or router.
a) ABC
b) ACD
c) ADC
d) All of the mentioned
View Answer
Answer: c
Explanation: An Application Delivery Controller is assigned a virtual IP address (VIP) that it maps
to a pool of servers based on application specific criteria.
10. Which of the following should be replaced with the question mark in the following
figure ?

a) Abstraction
b) Virtualization
c) Mobility Pattern
d) All of the mentioned
View Answer
Answer: b
Explanation: Virtualization is a key enabler of the first four of five key attributes of cloud
computing.
QUIZ

Virtualization 101

Posted by: Margaret Rouse

WhatIs.com

  

How much do you really know about virtualization?


Expert Anil Desai tests your knowledge.

1) Which of the following characteristics should you consider when


deciding whether to deploy an application or service to a virtual
machine?
a. Hardware requirements
b. Software support and compatibility
c. Licensing
d. Performance and resource requirements
e. Historical performance data
f. All of the above
Answer

2) Which of the following terms describes a situation in which many


virtual machines are deployed without proper IT oversight?
a. Server sprawl
b. Server consolidation
c. Network virtualization
d. Virtual machine sprawl
e. Storage virtualization
f. None of the above
Answer

3) Which of the following virtualization management approaches can


help organizations maintain optimal hardware resource utilization
over time?
a. Automatically reconfiguring virtual machines based on performance
statistics
b. Deploying multiple copies of virtual machines to different host servers
c. Automatically moving virtual machines based on changes to resource
requirements
d. Placing virtual machines on isolated virtual network switches
e. Storing virtual machines on a Storage Area Network (SAN)
f. Both a and c
Answer

4) You are a systems administrator that manages a lab environment


for your organization’s software developers and testers. How can you
reduce the amount of time and effort you spend on managing the lab
environment while providing quicker deployments of new virtual
machines?
a. Create a library of virtual machine templates and copy them to create
new VMs
b. Invest in self-service virtualization provisioning systems
c. Give developers and testers permissions to create and deploy new VMs
d. Define standardized configurations for test environment virtual machines
e. All of the above
Answer

5) You are a software tester that is testing a complex application that


is running within a single virtual machine. You have recently
encountered a rare and intermittent software defect that developers
have been unable to reproduce or troubleshoot in the past. Which of
the following steps should you take to allow developers to recreate
the issue?
a. Power off the virtual machine and discard any saved state information
b. Save the state of the virtual machine and provide a copy of it to your
developers to troubleshoot the problem
c. Roll back the state of the virtual machine to a point in time prior to when
the defect was discovered
d. Move the virtual machine to another host server to which developers
have access
Answer

6) You are a systems administrator that is responsible for supporting


a team of software testers in your organization. The test department
frequently requires new VMs running a wide variety of different
operating systems to thoroughly test a new application your company
is developing. VMs must be able to communicate with each other over
the network. You are concerned about the potential security impact of
these new VMs. Which of the following steps can you take to reduce
security risks?
a. Disable network and Internet access for all virtual machines
b. Place all test-related virtual machines on a private virtual network
c. Power on virtual machines only when they are being actively used in the
environment
d. Configure virtual machines to run under an account with limited
permissions
Answer
7) In which of the following types of virtualization are applications
stored and executed on the server?
a. Application Virtualization
b. Storage Virtualization
c. Presentation Virtualization
d. Network Virtualization
e. Server Virtualization
Answer

8) Which of the following is not a system requirement for running


Microsoft Hyper-V?
a. A 64-bit-capable CPU
b. A 64-bit edition of Windows Server 2008
c. Virtualization-related CPU extensions
d. At least 8GB of physical memory
e. BIOS and CPU support for the “No Execute” (NX) bit
Answer

9) Which of the following features is not supported in the initial


version of Hyper-V?
a. The ability to implement a guest-level cluster of virtual machines
b. The ability to implement host-level clusters to provide automatic fail-over
of VMs
c. The ability to store virtual hard disks on a storage area network
d. The ability to reconfigure memory and virtual CPU settings after a VM
has been created
e. The ability to perform a live migration of a virtual machine from one host
to another
Answer

10) Which of the following methods allows you to enable Hyper-V in


Windows Server 2008?
a. Use the Computer Management utility to enable the Hyper-V server role
b. Use the Hyper-V Admin Console to enable the Hyper-V server role
c. Use the Add Roles Wizard in the Server Manager console to add the
Hyper-V server role
d. None of the above – Hyper-V is installed and enabled by default in
Windows Server 2008

1. Which of the following tool is used for Web site monitoring service in LAMP ?

 A. Alertra

 B. Cacti

 C. Collectd

 D. None of the mentioned

 View Answer

 Workspace

 Report

 Discuss
Answer & Explanation

Answer: Option A
Explanation:
Cacti is RRDTool graphing module.
2. Which of the following is one of the major categories of Amazon Machine Instances
that you can create on the Amazon Web Service ?

 A. WAMP

 B. XAMPP

 C. LAMP

 D. None of the mentioned

 View Answer

 Workspace

 Report

 Discuss
3. An operating system running on a Type __ VM is a full virtualization.

 A. 1

 B. 2

 C. 3
 D. All of the mentioned

 View Answer

 Workspace

 Report

 Discuss
4. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto
the hardware.

 A. paravirtualization

 B. full virtualization

 C. emulation

 D. None of the mentioned

 View Answer

 Workspace

 Report

 Discuss
5. A _______ image makes a copy or a clone of the entire computer system inside a
single container such as a file.

 A. system

 B. software

 C. hardware

 D. None of the mentioned

 View Answer

 Workspace

 Report

 Discuss
Q.1 Which of the following type of virtualization is
also characteristic of cloud computing?
Storage

Application

CPU

All of the Above

Q.2 The technology used to distribute service requests


to resources is referred to as:
Load performing

Load scheduling

Load balancing

Q.3 Point out the correct statement:


A client can request access to a cloud service from any location

A cloud has multiple application instances and directs requests to an instance based
on conditions

Computers can be partitioned into a set of virtual machines with each machine
being assigned a workload

All of the mentioned

Q.4 Which of the following software can be used to


implement load balancing?
Apache mod_balancer

Apache mod_proxy_balancer

F6’s BigIP
Q.5 Which of the following network resources can be
load balanced?
Connections through intelligent switches

DNS

Storage resource

All of the above

Q.6 Which of the following is a more sophisticated


load balancer?
Rack server managers

Workload managers

Workspace managers

Q.7 A ______ is a combination load balancer and


application server that is a server placed between a
firewall or router.
ABC

ACD

ADC

Q.8 Which of the following service provider provides


the least amount of built-in security?
SaaS

PaaS

IaaS

Q.9 Point out the correct statement:


Different types of cloud computing service models provide different levels of
security services
Adapting your on-premises systems to a cloud model requires that you determine
what security mechanisms are required and mapping those to controls that exist in
your chosen cloud service provider

Data should be transferred and stored in an encrypted format for security purpose

All of the above

Q.10 Which of the following services that need to be


negotiated in Service Level Agreements?
Logging

Auditing

Regulatory compliance

All of the above

Q.11 Point out the wrong statement:


You can use proxy and brokerage services to separate clients from direct access to
shared cloud storage

Cloud computing doesn’t have vulnerabilities associated with Internet applications

Any distributed application has a much greater attack surface than an application
that is closely held on a Local Area Network

Q.12 Which of the following area of cloud computing


is uniquely troublesome?
Auditing

Data Integrity

E-Discovery for legal compliance

All of the above


Q.13 Which of the following is the operational domain
of CSA?
Scalability

Portability and interoperability

Flexibility

Q.14 Which of the following is considered an essential


element in cloud computing by CSA?
Multi-tenancy

Identity and access management

Virtualization

Q.15 Which of the following is used for Web


performance management and load testing?
VMware Hyperic

Web metrics

Univa UD

Tapinsystems
1. Which type of Hypervisor is shown in the following figure ?

a) Type 1
b) Type 2
c) Type 3
d) All of the mentioned
Answer: a

Explanation: :A hypervisor running on bare metal is a Type 1 VM or native VM.


2. Point out the wrong statement :

a) Load balancing virtualizes systems and resources by mapping a logical address to a physical
address
b) Multiple instances of various Google applications are running on different hosts
c) Google uses hardware virtualization
d) All of the mentioned
Answer: c

Explanation: Google performs server load balancing to distribute the processing load and to get
high utilization rates.
3. Which of the following is another name for system virtual machine ?

a) hardware virtual machine


b) software virtual machine
c) real machine
d) None of the mentioned
Answer: a

Explanation: Some virtual machines are designed to run only a single application or process and
are referred to as process virtual machines.
4. Which of the following provide system resource access to virtual machines ?
a) VMM
b) VMC
c) VNM
d) All of the mentioned
Answer: a

Explanation: VMM is another name for Hypervisor.


5. Point out the correct statement :

a) A virtual machine is a computer that is walled off from the physical computer that the virtual
machine
is running on
b) Virtual machines provide the capability of running multiple machine instances, each with their
own operating system
c) The downside of virtual machine technologies is that having resources indirectly addressed
means there is some level of overhead
d) All of the mentioned
Answer: d

Explanation: This makes virtual machine technology very useful for running old versions of
operating systems, testing applications in what amounts to a sandbox.
6. An operating system running on a Type __ VM is a full virtualization.

a) 1
b) 2
c) 3
d) All of the mentioned
Answer: a

Explanation: Because it is a complete simulation of the hardware that it is running on.


7. Which of the following is Type 1 Hypervisor ?

a) Wind River Simics


b) Virtual Server 2005 R2
c) KVM
d) LynxSecure
Answer: d
Explanation: Type 1 VMs have no host operating system because they are installed on a bare
system.
8. Which of the following is Type 2 VM ?

a) VirtualLogix VLX
b) VMware ESX
c) Xen
d) LynxSecure
Answer: c

Explanation: Xen is used by Amazon Web Services to provide Amazon Machine Instances
(AMIs).
9. Which of the following will be host operating system for Windows Server ?

a) VirtualLogix VLX
b) Microsoft Hyper-V
c) Xen
d) All of the mentioned
Answer: b

Explanation: Type 2 virtual machines are installed over a host operating system.
10. Which of the following should be placed in second lowermost layer for the following figure ?

a) Host Operating System


b) Software
c) VM
d) None of the mentioned
Answer: a

Explanation: Examples of Type 2 Virtual Machine Monitors are Containers, KVM, Microsoft
Hyper V and Parallels Desktop for Mac.
11. What does the following figure represent ?

a) vSquare cloud infrastructure


b) vCube cloud infrastructure
c) vSphere cloud infrastructure
d) None of the mentioned
Answer: c

Explanation: vSphere is the branding for a set of management tools and a set of products
previously labeled VMware Infrastructure.
12. Point out the wrong statement :

a) Some hypervisors are installed over an operating system and are referred to as Type 2 or
hosted VM
b) All CPUs support virtual machines
c) On a Type 2 VM, a software interface is created that emulates the devices with which a
system would normally interact
d) All of the mentioned
Answer: b

Explanation: Not all CPUs support virtual machines, and many that do require that you enable
this support in the BIOS.
13. Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V
?

a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
Answer: a

Explanation: It is the host operating system that is performing the I/O through a para-API.
14. In _______ the virtual machine simulates hardware, so it can be independent of the
underlying system hardware.

a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
Answer: c

Explanation: A guest operating system using emulation does not need to be modified in any way.
15. Point out the wrong statement :

a) Full virtualization requires that the host operating system provide a virtual machine interface
for the guest operating system and that the guest access hardware through that host VM
b) Guest operating systems in full virtualization systems are generally faster than other
virtualization schemes
c) A process virtual machine instantiates when a command begins a process
d) All of the mentioned
Answer: a

Explanation: An operating system running as a guest on a paravirtualization system must be


ported to work with the host interface.
16. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto the
hardware.

a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
Answer: b

Explanation: All operating systems in full virtualization communicate directly with the VM
hypervisor.
17. Which of the following operating system support operating system virtualization ?

a) Windows NT
b) Sun Solaris
c) Windows XP
d) Compliance
Answer: b

Explanation: This type of virtualization creates virtual servers at the operating system or kernel
level.
18. Which of the following is a service that aggregates servers into an assignable pool ?

a) VMware vStorage
b) VMware vNetwork
c) VMware vCompute
d) Application services
Answer: c

Explanation: VMware vSphere is a management infrastructure framework that virtualizes system,


storage, and networking hardware to create cloud computing infrastructures.
19. _________ is a service that creates and manages virtual network interfaces.

a) VMware vStorage
b) VMware vNetwork
c) VMware vCompute
d) Application services
Answer: b

Explanation: VMware vStorage is a service that aggregates storage resources into an assignable
pool.
20. Which of the following allows a virtual machine to run on two or more physical processors at
the same time ?

a) Virtual SMP
b) Distributed Resource Scheduler
c) vNetwork Distributed Switch
d) Storage VMotion
Answer: a

Explanation: The virtualization layer that abstracts processing, memory, and storage uses the
VMware ESX or ESXi virtualization server.
1. Virtualization hosts can use all of the following except:
1. Virtual Network Storage arrays
2. File systems
3. Virtual Machine Manager
4. Disaster recovery solutions

2. A host server has 4 processors, each with 8 cores. If you can allocate 8 vCPUs per
pCPU, how many vCPUs can be allocated?
1. Each processor has eight cores. Each core (pCPU) can support eight
vCPUs. 4 processors x 8 cores x 8 vCPUs = 256 vCPUs
2. False

The hypervisor handles all of the storage I/O requests from the guest the
network I/O, memory processing, and CPU work.
3. Webserver
4. Application Server

3. Virtual machines can be protected in the event of a data center interruption by


utilizing:
1. Disaster recovery solutions
2. User application
3. True
4. Open virtualization format (OVF)

4. VMware Tools are installed in a virtual machine for all except:


1. Virtual Network Storage arrays
2. Dynamic Addition
3. Enhanced memory utilization
4. Virtual Machine Manager

5. T/F
Possible changes to virtual CPUs in a virtual machine include only the amount of
virtual CPUs
1. False
2. True
3. Sysprep
4. vApp

5 True/False questions

1. T/F
Suspending an application is mandatory during a Physical-to-Virtual conversion
process to ensure all changes are migrated to the newly created virtual machine
correctly. → False

Hot cloning performs the clone operation while the source server is booted and the
application is running. A hot clone allows the P2V to complete without disrupting the
application.
True False

2. Companies use virtualization to do all of the following except: → Reduce the amount


of applications in corporate datacenters
True False

3. T/F
Hypervisors allow multiple virtual machines to simultaneously share USB
devices. → False
True False

4. T/F
Linked clones cannot operate if their reference virtual machine is not
available. → True
True False

5. Hypervisors manage the virtual machine's memory use of physical memory through
the implementation of ____________. → virtual appliance
True False
1.Which of the following dvPort binding types have been removed in vSphere 5?
A. Dynamic Binding
B. Ephemeral Binding
C. Static Binding
Ans: A

2.Your boss has asked you to setup 4 ESXi hosts to evaluate the new vSphere 5 release, which is the
recommended install method to use in this situation?
A. Interactive Installation
B. Scripted Installation
C. vSphere Auto Deploy Installation
D. Upgrade via VMware Update Manager
Ans: A

3.Your colleague has accidentally allocated more vRAM than your company are licensed for. What
will happen to your virtual machines?
A. All VM’s will be Powered Off
B. New VM’s can not be Powered On
C. VMware will be notified
D. Nothing will happen
Ans: B

4.In an HA cluster after an initial election process, host are either:


A. Primary or Secondary
B. Master or Slave
C. King or Queen
D. Live or Standby
Ans: B

5.To get the maximum performance benefits of vNUMA it is recommended to:


A. Make sure your clusters are composed entirely of hosts with matching NUMA architecture.
B. Only use single vCPU virtual machines
C. Enable EVC on your clusters
D. Disable Hyper-Threading
Ans: A

6.What is the name of the globally unique identifier assigned to each Fibre Channel Port?
A. IP Address
B. MAC Address (Mac)
C. World Wide Name (WWN)
D. Port_ID
Ans: C

7.It is possible to Storage vMotion virtual machines that have snapshots?


A. True
B. False
Ans: A

8.What are the 4 VM Restart Priority options available on an HA Cluster?


A. Disabled, Low, Medium, High
B. Enabled, Small, Medium, Large
C. 1st, 2nd, 3rd, 4th
D. Priority, 2nd Tier, 3rd Tier, Best Effort
Ans: A

9.A memory reservation defines:


A. the amount of virtual machine memory that can be paged to the VMkernel swapfile
B. the amount of physical memory that is guaranteed to the VM
C. the maximum amount of physical memory that will be used by a VM
D. the amount of host memory reserved for the VMkernel
Ans: D

10.Which of the following installation methods installs the ESXi image directly into the Host memory?
A. Interactive ESXi Installation
B. Scripted ESXi Installation
C. vSphere Auto Deploy ESXi Installation Option
D. Upgrade via VMware Update Manager
Ans: D

11.VMFS-5 upgraded from VMFS-3 continues to use the previous file block size which may be larger
than the unified 1MB file block size.
A. True
B. False
Ans: A

12.Which of the following formulas defines the amount of virtual machine memory that will always be
composed of disk pages?
A. Memory allocated -(minus) memory limit
B. Memory limit -(minus) memory reservation
C. Memory limit -(minus) memory available
D. Memory allocated -(minus) memory available
Ans: D

13.The upgrade procedure from VMFS-3 to VMFS-5 will require downtime of that datastore?
A. False
B. True
Ans: A

14.Which of the following actions would be LEAST likely to reduce resource contention?
A. Powering off a VM
B. Enabling Swap-To-Cache
C. Disable transparent memory page sharing
D. Enabling vNUMA
Ans: C

15.When is vNUMA enable by default on a virtual machines?


A. When a virtual machine has more than 8 vCPU’s
B. When the guestOS is configured using an SMP HAL
C. All the time
D. vNUMA is never enabled by default
Ans: A

16.Which new feature of vSphere 5 is used to collect host core dumps?


A. vMA 5.0
B. ESXi Dump Collector
C. ESXi Syslog Collector
D. VMware vDR 2.0
Ans: B
17.After an upgrade from ESX4.X to ESXi5.0 you notice that when you run the following command via
the vMA: “esxcfg-vswif -l” you notice that their are no configure vswif interfaces listed. Why would this
be?
A. The Service Console is no longer available with vSphere 5. All vswif interfaces are removed during
the upgrade.
B. During the upgrade process all vswif interfaces are migrated to vmk interfaces.
C. During the upgrade process, vswif interfaces are disable by default, they’ll need to be enable
before they will be listed.
D. The wrong command is being used. “vicfg-vswif -l” is the correct command to display all vswif
interfaces.
Ans: B

18.How has vMotion been improved in vSphere 5?


A. Multiple vMotion vmknics, allowing for more and faster vMotion operations
B. Long distance vMotion, allowing for vMotions over a large geographical area
C. Multi-platform vMotion, allowing for vMotions between vSphere and Hyper-V platforms
D. Storage vMotion, allowing for virtual machines storage to be moved between datastores
Ans: D

19.What are the Automation Levels on a DRS Cluster?


A. Manual, Partially Automatic, Fully Automatic
B. Manual, Partially Automated, Fully Automated
C. Manual, Semi Automated, Fully Automatic
D. Manual, Semi Automatic, Automatic
Ans: D

20.What are the two iSCSI discovery methods that are supported by an ESXi host?
A. Static Targets, Dynamic Targets
B. Static Discovery, SendTargets
C. Static Discovery, FindTargets
D. Dynamic Discovery, FindTargets
Ans: A

21.After an upgrade from ESX4.X to ESXi5.0 you notice that your Port Group named “Service
Console” is missing. Where has it gone?
A. Because ESXi 5.0 has no Service Console, upgrading from ESX 4.x to ESXi 5.0 removes the
Service Console port group.
B. During the upgrade all Port Groups are removed. The Service Console Port Group will need to be
recreated.
C. During the upgrade all Port Groups are moved to Distributed Switches.
D. During the upgrade all Port Groups are moved to Standard Switches.
Ans: A

22.You have been asked to provide high availability for your vCenter server. Which product would you
use to help achieve this?
A. Fault-Tolerance
B. vCenter Linked-Mode
C. vCenter Heartbeat
D. Microsoft Clustering Services
Ans: C

23.VMware vSphere can be evaluated prior to purchase. What is the maximum number of days the
evaluation can be used before a license must be purchased?
A. 30 Days
B. 60 Days
C. 90 Days
D. 120 Days
Ans: B

24.Which feature of vSphere 5 can be used to increase network throughput to virtual machines?
A. SplitRX
B. NPIV
C. VMDirectpath I/O
D. RDM
Ans: A

25.Which feature of vSphere 5 can be used to reduce virtual machine memory overhead?
A. VMX Swap
B. SplitRX
C. Swap to Host
D. Memory Reservations
Ans: A

26.By default, where do hosts deployed with VMware Auto Deploy store logs?
A. In Memory
B. First mounted LUN
C. Local disk
D. vMA
Ans: A

27.Which new feature of vSphere 5 is used to create ESXi installation images with a customized set
of updates, patches, and drivers?
A. Image Builder
B. Host Profiles
C. Auto Deploy
D. Esxcli
Ans: D

28.Which of the following is not a new feature made available with vSphere 5?
A. sDRS
B. vDR
C. VSA
D. vSphere Web Client
Ans: B

29.What protocol is used by an ESXi host to communicate with NAS devices?


A. NFS
B. iSCSI
C. CIFS
D. SMB
Ans: B

30.After an upgrade from ESX/ESXi 4.1 to ESXi 5.0, your monitoring department are reporting that
they have stopped receiving Syslog data from all of the ESXi hosts. What could be the problem?
A. Custom ports that were opened by using the ESX/ESXi 4.1 esxcfg-firewall command do not remain
open after the upgrade to ESXi 5.0.
B. Custom ports that were opened by using the ESX/ESXi 4.1 esxcfg-firewall command do not do not
get copied during the upgrade to ESXi 5.0.
C. Tech Support Mode is disable by default after an upgrade to ESXi 5.0 stopping all traffic on all
ports
D. ESXi 5.0 cannot send logs to Syslog servers.
Ans: D

31.The default security policy on a Port Group is:


A. Reject, Accept, Accept
B. Reject, Reject, Reject
C. Accept, Accept, Accept
D. Reject, Reject, Accept
Ans: A

32.When deploying hosts with VMware Auto Deploy, which is the recommended method to configure
ESXi once it has been installed?
A. Host Profiles
B. PowerCLI
C. Manually
D. via Direct Console
Ans: A

33.What is an HA Slot?
A. A slot is a logical representation of the memory and CPU resources that satisfy the requirements
for any powered-on virtual machine in the cluster.
B. A slot is a given to each Host in an HA Cluster, there is a maximum of 32 in an HA Cluster
C. A slot is given to each Virtual Machine, this determines the restart priority.
D. A slot has nothing to do with HA, it’s how DRS calculates which Virtual Machine should be placed
where.
Ans: A

34.Which new version of VMFS is introduced by vSphere 5?


A. VMFS-2
B. VMFS-3
C. VMFS-5
D. VMFS-4
Ans: C

35.ESXi 5.0 supports only LAHF and SAHF CPU instructions?


A. True
B. False
Ans: A

36.Which of the following is no longer available with vSphere 5?


A. ESX
B. vCenter
C. vSphere Client
D. PowerCLI
Ans: D

37.Which if the following is not a supported location for a host diagnostic partition?
A. Shared local storage
B. Private local storage
C. Private SAN storage
D. Shared SAN storage
Ans: A

38.Which of the following actions is not available via the Direct Console?
A. Shutdown host
B. Enter host into Maintenance Mode
C. View host logs
D. Configure host DNS
Ans: B

39.Which vSphere feature provides dynamic allocation of storage capacity?


A. vStorage APIs / VCB
B. Thinapp
C. sDRS
D. vStorage Thin Provisioning
Ans: C

40.To improve security which new feature has been added to ESXi?
A. Firewall
B. Local Mode
C. Anti-Virus
D. vShield
Ans: A

41.What the packaging format used by the VMware ESXi Image Builder?
A. .rar
B. .zip
C. .iso
D. VIB
Ans: C

42.What are the three default roles provided on an ESXi host?


A. No Access, Read Only and Administrator
B. Read only, Operator Access and Administrator
C. Virtual Machine User, Virtual Machine Power User and Administrator
D. Network Consumer, Datastore Consumer and Resource Pool Administrator
Ans: A

43.Which of the following is a requirement for vCenter?


A. A Static IP address
B. A DHCP IP address
C. A valid (internal) domain name system (DNS) registration.
Ans: C

44.Which two users are assigned the Administrator role at the ESX Server level by default?
A. root, administrator
B. root, vpxuser
C. root, vpxa
D. root, hostd
Ans: B

45.After an upgrade from ESXi4.0 to ESXi5.0 you are unable to putty to your hosts. What could have
caused this?
A. SSH configuration is not migrated for ESX 4.x hosts or ESXi 4.0 hosts. For these hosts, SSH
access is disabled during the upgrade or migration process
B. SSH is not available with ESXi 5.0, it is only available with ESX 5.0.
C. SSH is always disabled after an upgrade or clean installation.
D. The SSH port in ESXi 5.0 has changed to 443 for added security.
Ans: A

46.What are the three Host Isolation Response options available on an HA Cluster?
A. Shut down, Power off, Leave powered on
B. Shut down, Power off, Leave powered off
C. Shut down, Restart, Leave powered on
D. Shut down, Restart, power on
Ans: B

47.You boss has asked you deploy 40 ESXi hosts as quickly as possible, which is the recommended
install method to use in this situation?
A. Interactive Installation
B. Scripted Installation
C. VMware Auto Deploy Installation
D. Upgrade via VMware Update Manager
Ans: D

48.Distributed Power Management (DPM) requires which technology to be available on the NIC?
A. Wake On LAN (WOL)
B. DNS
C. BMC
D. NetBIOS
Ans: A

49.The organisation you work for is currently running vSphere 4.1 U1. Your team have just created a
new Test/Dev environment based on vSphere 5. The VM management team have asked if you could
combine the current 4.1 U1 environment and 5.0 vCenters with Linked-Mode. What is the correct
response to the VM management team?
A. vCenter 4.1 and vCenter cannot be joined with Linked-Mode
B. Additional licensing is required to use Linked-Mode
C. Only vCenter Administrators can use Linked-Mode
D. No problem
Ans: D

50.Which of the following is not a benefit of VMware Auto Deploy?


A. Decouples the VMware ESXi host from the physical server and eliminates the boot disk
B. Eliminates configuration drift
C. Simplifies patching and updating
D. Accelerates deployment of virtual machine

Q: Which of the following capabilities helps simplify the customer experience in


vSphere 6.7?
 A : vSphere Quick Boot  B : Linked Mode Support for vCSA with
Embedded PSC  C : vCSA Backup Scheduler  D : All of the above
Q: True or false: HTML5-based vSphere 6.7 Client now has plugins for vSAN,
VUM and NSX.
 A : True  B : False
Q: True or false: With vSphere 6.7, patching and upgrade of ESXi hosts requires
two reboots.
 A : True  B : False
Q: Which of the following metrics show the performance improvements of
vSphere 6.7 over vSphere 6.5?
 A : 2X faster vCenter operations per second  B : 3X Reduction in memory
usage  C : 3X Faster DRS-related operations  D : All of the above
Q: True or false: vCenter Server Appliance enables customers to link multiple
vCenters, providing seamless visibility across their IT environment.
 A : True  B : False
Q: Which of the following events can be audited through vCenter Server?
 A : User Management (Creation, Deletion, Edit)  B : SSO Group (Creation,
Deletion, Edit Users)  C : SS Identity Source (Adding, Removing, Editing)  D
: Successful or Failed User Login Attempts  E : All of the above
Next 

You might also like