MCQs
MCQs
Technologies
This set of Cloud Computing Multiple Choice Questions & Answers (MCQs) focuses on
“Virtualization Technologies”.
a)
b)
c)
d) All of the mentioned
View Answer
Answer: a
Explanation: You can define the features in software and hardware that enables flexibility as
conforming to one or more of the mobility patterns.
2. Point out the wrong statement :
a) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
b) Virtualization assigns a logical name for a physical resource and then provides a
pointer to that physical resource when a request is made
c) All cloud computing applications combine their resources into pools that can be
assigned on demand to users
d) All of the mentioned
View Answer
Answer: c
Explanation: Several important cloud computing approaches use a strictly hardware-based
approach to abstraction.
3. Which of the following type of virtualization is also characteristic of cloud computing ?
a) Storage
b) Application
c) CPU
d) All of the mentioned
View Answer
Answer: d
Explanation: To enable these characteristics, resources must be highly configurable and flexible.
4. The technology used to distribute service requests to resources is referred to as :
a) load performing
b) load scheduling
c) load balancing
d) all of the mentioned
View Answer
Answer: c
Explanation: Load balancing is an optimization technique.
5. Point out the correct statement :
a) A client can request access to a cloud service from any location
b) A cloud has multiple application instances and directs requests to an instance based
on conditions
c) Computers can be partitioned into a set of virtual machines with each machine being
assigned a workload
d) All of the mentioned
View Answer
Answer: d
Explanation: Alternatively, systems can be virtualized through load-balancing technologies.
6. Which of the following software can be used to implement load balancing ?
a) Apache mod_balancer
b) Apache mod_proxy_balancer
c) F6’s BigIP
d) All of the mentioned
View Answer
Answer: b
Explanation: Load balancing can be used to increase utilization and throughput, lower latency,
reduce response time, and avoid system overload.
7. Which of the following network resources can be load balanced ?
a) Connections through intelligent switches
b) DNS
c) Storage resources
d) All of the mentioned
View Answer
Answer: d
Explanation: Load balancing provides the necessary redundancy to make an intrinsically
unreliable system reliable through managed redirection.
8. Which of the following is a more sophisticated load balancer ?
a) workload managers
b) workspace managers
c) rackserve managers
d) all of the mentioned
View Answer
Answer: a
Explanation: They determine the current utilization of the resources in their pool.
9. An ______ is a combination load balancer and application server that is a server
placed between a firewall or router.
a) ABC
b) ACD
c) ADC
d) All of the mentioned
View Answer
Answer: c
Explanation: An Application Delivery Controller is assigned a virtual IP address (VIP) that it maps
to a pool of servers based on application specific criteria.
10. Which of the following should be replaced with the question mark in the following
figure ?
a) Abstraction
b) Virtualization
c) Mobility Pattern
d) All of the mentioned
View Answer
Answer: b
Explanation: Virtualization is a key enabler of the first four of five key attributes of cloud
computing.
QUIZ
Virtualization 101
WhatIs.com
1. Which of the following tool is used for Web site monitoring service in LAMP ?
A. Alertra
B. Cacti
C. Collectd
View Answer
Workspace
Report
Discuss
Answer & Explanation
Answer: Option A
Explanation:
Cacti is RRDTool graphing module.
2. Which of the following is one of the major categories of Amazon Machine Instances
that you can create on the Amazon Web Service ?
A. WAMP
B. XAMPP
C. LAMP
View Answer
Workspace
Report
Discuss
3. An operating system running on a Type __ VM is a full virtualization.
A. 1
B. 2
C. 3
D. All of the mentioned
View Answer
Workspace
Report
Discuss
4. In a ____________ scheme, the VM is installed as a Type 1 Hypervisor directly onto
the hardware.
A. paravirtualization
B. full virtualization
C. emulation
View Answer
Workspace
Report
Discuss
5. A _______ image makes a copy or a clone of the entire computer system inside a
single container such as a file.
A. system
B. software
C. hardware
View Answer
Workspace
Report
Discuss
Q.1 Which of the following type of virtualization is
also characteristic of cloud computing?
Storage
Application
CPU
Load scheduling
Load balancing
A cloud has multiple application instances and directs requests to an instance based
on conditions
Computers can be partitioned into a set of virtual machines with each machine
being assigned a workload
Apache mod_proxy_balancer
F6’s BigIP
Q.5 Which of the following network resources can be
load balanced?
Connections through intelligent switches
DNS
Storage resource
Workload managers
Workspace managers
ACD
ADC
PaaS
IaaS
Data should be transferred and stored in an encrypted format for security purpose
Auditing
Regulatory compliance
Any distributed application has a much greater attack surface than an application
that is closely held on a Local Area Network
Data Integrity
Flexibility
Virtualization
Web metrics
Univa UD
Tapinsystems
1. Which type of Hypervisor is shown in the following figure ?
a) Type 1
b) Type 2
c) Type 3
d) All of the mentioned
Answer: a
a) Load balancing virtualizes systems and resources by mapping a logical address to a physical
address
b) Multiple instances of various Google applications are running on different hosts
c) Google uses hardware virtualization
d) All of the mentioned
Answer: c
Explanation: Google performs server load balancing to distribute the processing load and to get
high utilization rates.
3. Which of the following is another name for system virtual machine ?
Explanation: Some virtual machines are designed to run only a single application or process and
are referred to as process virtual machines.
4. Which of the following provide system resource access to virtual machines ?
a) VMM
b) VMC
c) VNM
d) All of the mentioned
Answer: a
a) A virtual machine is a computer that is walled off from the physical computer that the virtual
machine
is running on
b) Virtual machines provide the capability of running multiple machine instances, each with their
own operating system
c) The downside of virtual machine technologies is that having resources indirectly addressed
means there is some level of overhead
d) All of the mentioned
Answer: d
Explanation: This makes virtual machine technology very useful for running old versions of
operating systems, testing applications in what amounts to a sandbox.
6. An operating system running on a Type __ VM is a full virtualization.
a) 1
b) 2
c) 3
d) All of the mentioned
Answer: a
a) VirtualLogix VLX
b) VMware ESX
c) Xen
d) LynxSecure
Answer: c
Explanation: Xen is used by Amazon Web Services to provide Amazon Machine Instances
(AMIs).
9. Which of the following will be host operating system for Windows Server ?
a) VirtualLogix VLX
b) Microsoft Hyper-V
c) Xen
d) All of the mentioned
Answer: b
Explanation: Type 2 virtual machines are installed over a host operating system.
10. Which of the following should be placed in second lowermost layer for the following figure ?
Explanation: Examples of Type 2 Virtual Machine Monitors are Containers, KVM, Microsoft
Hyper V and Parallels Desktop for Mac.
11. What does the following figure represent ?
Explanation: vSphere is the branding for a set of management tools and a set of products
previously labeled VMware Infrastructure.
12. Point out the wrong statement :
a) Some hypervisors are installed over an operating system and are referred to as Type 2 or
hosted VM
b) All CPUs support virtual machines
c) On a Type 2 VM, a software interface is created that emulates the devices with which a
system would normally interact
d) All of the mentioned
Answer: b
Explanation: Not all CPUs support virtual machines, and many that do require that you enable
this support in the BIOS.
13. Which of the following type of virtualization is found in hypervisor such as Microsoft’s Hyper-V
?
a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
Answer: a
Explanation: It is the host operating system that is performing the I/O through a para-API.
14. In _______ the virtual machine simulates hardware, so it can be independent of the
underlying system hardware.
a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
Answer: c
Explanation: A guest operating system using emulation does not need to be modified in any way.
15. Point out the wrong statement :
a) Full virtualization requires that the host operating system provide a virtual machine interface
for the guest operating system and that the guest access hardware through that host VM
b) Guest operating systems in full virtualization systems are generally faster than other
virtualization schemes
c) A process virtual machine instantiates when a command begins a process
d) All of the mentioned
Answer: a
a) paravirtualization
b) full virtualization
c) emulation
d) none of the mentioned
Answer: b
Explanation: All operating systems in full virtualization communicate directly with the VM
hypervisor.
17. Which of the following operating system support operating system virtualization ?
a) Windows NT
b) Sun Solaris
c) Windows XP
d) Compliance
Answer: b
Explanation: This type of virtualization creates virtual servers at the operating system or kernel
level.
18. Which of the following is a service that aggregates servers into an assignable pool ?
a) VMware vStorage
b) VMware vNetwork
c) VMware vCompute
d) Application services
Answer: c
a) VMware vStorage
b) VMware vNetwork
c) VMware vCompute
d) Application services
Answer: b
Explanation: VMware vStorage is a service that aggregates storage resources into an assignable
pool.
20. Which of the following allows a virtual machine to run on two or more physical processors at
the same time ?
a) Virtual SMP
b) Distributed Resource Scheduler
c) vNetwork Distributed Switch
d) Storage VMotion
Answer: a
Explanation: The virtualization layer that abstracts processing, memory, and storage uses the
VMware ESX or ESXi virtualization server.
1. Virtualization hosts can use all of the following except:
1. Virtual Network Storage arrays
2. File systems
3. Virtual Machine Manager
4. Disaster recovery solutions
2. A host server has 4 processors, each with 8 cores. If you can allocate 8 vCPUs per
pCPU, how many vCPUs can be allocated?
1. Each processor has eight cores. Each core (pCPU) can support eight
vCPUs. 4 processors x 8 cores x 8 vCPUs = 256 vCPUs
2. False
The hypervisor handles all of the storage I/O requests from the guest the
network I/O, memory processing, and CPU work.
3. Webserver
4. Application Server
5. T/F
Possible changes to virtual CPUs in a virtual machine include only the amount of
virtual CPUs
1. False
2. True
3. Sysprep
4. vApp
5 True/False questions
1. T/F
Suspending an application is mandatory during a Physical-to-Virtual conversion
process to ensure all changes are migrated to the newly created virtual machine
correctly. → False
Hot cloning performs the clone operation while the source server is booted and the
application is running. A hot clone allows the P2V to complete without disrupting the
application.
True False
3. T/F
Hypervisors allow multiple virtual machines to simultaneously share USB
devices. → False
True False
4. T/F
Linked clones cannot operate if their reference virtual machine is not
available. → True
True False
5. Hypervisors manage the virtual machine's memory use of physical memory through
the implementation of ____________. → virtual appliance
True False
1.Which of the following dvPort binding types have been removed in vSphere 5?
A. Dynamic Binding
B. Ephemeral Binding
C. Static Binding
Ans: A
2.Your boss has asked you to setup 4 ESXi hosts to evaluate the new vSphere 5 release, which is the
recommended install method to use in this situation?
A. Interactive Installation
B. Scripted Installation
C. vSphere Auto Deploy Installation
D. Upgrade via VMware Update Manager
Ans: A
3.Your colleague has accidentally allocated more vRAM than your company are licensed for. What
will happen to your virtual machines?
A. All VM’s will be Powered Off
B. New VM’s can not be Powered On
C. VMware will be notified
D. Nothing will happen
Ans: B
6.What is the name of the globally unique identifier assigned to each Fibre Channel Port?
A. IP Address
B. MAC Address (Mac)
C. World Wide Name (WWN)
D. Port_ID
Ans: C
10.Which of the following installation methods installs the ESXi image directly into the Host memory?
A. Interactive ESXi Installation
B. Scripted ESXi Installation
C. vSphere Auto Deploy ESXi Installation Option
D. Upgrade via VMware Update Manager
Ans: D
11.VMFS-5 upgraded from VMFS-3 continues to use the previous file block size which may be larger
than the unified 1MB file block size.
A. True
B. False
Ans: A
12.Which of the following formulas defines the amount of virtual machine memory that will always be
composed of disk pages?
A. Memory allocated -(minus) memory limit
B. Memory limit -(minus) memory reservation
C. Memory limit -(minus) memory available
D. Memory allocated -(minus) memory available
Ans: D
13.The upgrade procedure from VMFS-3 to VMFS-5 will require downtime of that datastore?
A. False
B. True
Ans: A
14.Which of the following actions would be LEAST likely to reduce resource contention?
A. Powering off a VM
B. Enabling Swap-To-Cache
C. Disable transparent memory page sharing
D. Enabling vNUMA
Ans: C
20.What are the two iSCSI discovery methods that are supported by an ESXi host?
A. Static Targets, Dynamic Targets
B. Static Discovery, SendTargets
C. Static Discovery, FindTargets
D. Dynamic Discovery, FindTargets
Ans: A
21.After an upgrade from ESX4.X to ESXi5.0 you notice that your Port Group named “Service
Console” is missing. Where has it gone?
A. Because ESXi 5.0 has no Service Console, upgrading from ESX 4.x to ESXi 5.0 removes the
Service Console port group.
B. During the upgrade all Port Groups are removed. The Service Console Port Group will need to be
recreated.
C. During the upgrade all Port Groups are moved to Distributed Switches.
D. During the upgrade all Port Groups are moved to Standard Switches.
Ans: A
22.You have been asked to provide high availability for your vCenter server. Which product would you
use to help achieve this?
A. Fault-Tolerance
B. vCenter Linked-Mode
C. vCenter Heartbeat
D. Microsoft Clustering Services
Ans: C
23.VMware vSphere can be evaluated prior to purchase. What is the maximum number of days the
evaluation can be used before a license must be purchased?
A. 30 Days
B. 60 Days
C. 90 Days
D. 120 Days
Ans: B
24.Which feature of vSphere 5 can be used to increase network throughput to virtual machines?
A. SplitRX
B. NPIV
C. VMDirectpath I/O
D. RDM
Ans: A
25.Which feature of vSphere 5 can be used to reduce virtual machine memory overhead?
A. VMX Swap
B. SplitRX
C. Swap to Host
D. Memory Reservations
Ans: A
26.By default, where do hosts deployed with VMware Auto Deploy store logs?
A. In Memory
B. First mounted LUN
C. Local disk
D. vMA
Ans: A
27.Which new feature of vSphere 5 is used to create ESXi installation images with a customized set
of updates, patches, and drivers?
A. Image Builder
B. Host Profiles
C. Auto Deploy
D. Esxcli
Ans: D
28.Which of the following is not a new feature made available with vSphere 5?
A. sDRS
B. vDR
C. VSA
D. vSphere Web Client
Ans: B
30.After an upgrade from ESX/ESXi 4.1 to ESXi 5.0, your monitoring department are reporting that
they have stopped receiving Syslog data from all of the ESXi hosts. What could be the problem?
A. Custom ports that were opened by using the ESX/ESXi 4.1 esxcfg-firewall command do not remain
open after the upgrade to ESXi 5.0.
B. Custom ports that were opened by using the ESX/ESXi 4.1 esxcfg-firewall command do not do not
get copied during the upgrade to ESXi 5.0.
C. Tech Support Mode is disable by default after an upgrade to ESXi 5.0 stopping all traffic on all
ports
D. ESXi 5.0 cannot send logs to Syslog servers.
Ans: D
32.When deploying hosts with VMware Auto Deploy, which is the recommended method to configure
ESXi once it has been installed?
A. Host Profiles
B. PowerCLI
C. Manually
D. via Direct Console
Ans: A
33.What is an HA Slot?
A. A slot is a logical representation of the memory and CPU resources that satisfy the requirements
for any powered-on virtual machine in the cluster.
B. A slot is a given to each Host in an HA Cluster, there is a maximum of 32 in an HA Cluster
C. A slot is given to each Virtual Machine, this determines the restart priority.
D. A slot has nothing to do with HA, it’s how DRS calculates which Virtual Machine should be placed
where.
Ans: A
37.Which if the following is not a supported location for a host diagnostic partition?
A. Shared local storage
B. Private local storage
C. Private SAN storage
D. Shared SAN storage
Ans: A
38.Which of the following actions is not available via the Direct Console?
A. Shutdown host
B. Enter host into Maintenance Mode
C. View host logs
D. Configure host DNS
Ans: B
40.To improve security which new feature has been added to ESXi?
A. Firewall
B. Local Mode
C. Anti-Virus
D. vShield
Ans: A
41.What the packaging format used by the VMware ESXi Image Builder?
A. .rar
B. .zip
C. .iso
D. VIB
Ans: C
44.Which two users are assigned the Administrator role at the ESX Server level by default?
A. root, administrator
B. root, vpxuser
C. root, vpxa
D. root, hostd
Ans: B
45.After an upgrade from ESXi4.0 to ESXi5.0 you are unable to putty to your hosts. What could have
caused this?
A. SSH configuration is not migrated for ESX 4.x hosts or ESXi 4.0 hosts. For these hosts, SSH
access is disabled during the upgrade or migration process
B. SSH is not available with ESXi 5.0, it is only available with ESX 5.0.
C. SSH is always disabled after an upgrade or clean installation.
D. The SSH port in ESXi 5.0 has changed to 443 for added security.
Ans: A
46.What are the three Host Isolation Response options available on an HA Cluster?
A. Shut down, Power off, Leave powered on
B. Shut down, Power off, Leave powered off
C. Shut down, Restart, Leave powered on
D. Shut down, Restart, power on
Ans: B
47.You boss has asked you deploy 40 ESXi hosts as quickly as possible, which is the recommended
install method to use in this situation?
A. Interactive Installation
B. Scripted Installation
C. VMware Auto Deploy Installation
D. Upgrade via VMware Update Manager
Ans: D
48.Distributed Power Management (DPM) requires which technology to be available on the NIC?
A. Wake On LAN (WOL)
B. DNS
C. BMC
D. NetBIOS
Ans: A
49.The organisation you work for is currently running vSphere 4.1 U1. Your team have just created a
new Test/Dev environment based on vSphere 5. The VM management team have asked if you could
combine the current 4.1 U1 environment and 5.0 vCenters with Linked-Mode. What is the correct
response to the VM management team?
A. vCenter 4.1 and vCenter cannot be joined with Linked-Mode
B. Additional licensing is required to use Linked-Mode
C. Only vCenter Administrators can use Linked-Mode
D. No problem
Ans: D