Download the complete Hands on Virtual Computing 2nd Edition Simpson Test Bank book instantly in PDF format.
Download the complete Hands on Virtual Computing 2nd Edition Simpson Test Bank book instantly in PDF format.
https://testbankfan.com/product/hands-on-virtual-computing-2nd-
edition-simpson-solutions-manual/
https://testbankfan.com/product/hands-on-ethical-hacking-and-network-
defense-2nd-edition-simpson-test-bank/
https://testbankfan.com/product/hands-on-ethical-hacking-and-network-
defense-1st-edition-simpson-test-bank/
https://testbankfan.com/product/hands-on-ethical-hacking-and-network-
defense-1st-edition-simpson-solutions-manual/
Hands-On Database 2nd Edition Steve Conger Test Bank
https://testbankfan.com/product/hands-on-database-2nd-edition-steve-
conger-test-bank/
https://testbankfan.com/product/hands-on-networking-fundamentals-2nd-
edition-michael-palmer-test-bank/
https://testbankfan.com/product/hands-on-database-2nd-edition-steve-
conger-solutions-manual/
https://testbankfan.com/product/hands-on-networking-fundamentals-2nd-
edition-michael-palmer-solutions-manual/
1. The e1000 network adapter type is the default adapter used by vSphere for virtual machines that run 64-but
guest operating systems.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/27/2017 10:14 AM
3. VMware vSphere 6 provides support for USB 3.0 devices in virtual machines.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
4. NIC teaming policies are set for an entire standard switch, and cannot be changed at the port group level.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: Virtual Network Switch Policies
Copyright Cengage Learning. Powered by Cognero. Page 1
Name: Class: Date:
5. Each VMkernel port must be configured with its own IP address and gateway.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: Configuring Virtual Switches
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
Multiple Choice
6. What are the two major console interfaces used to work with an ESXi host?
a. Direct Console User Interface (DCUI) and vCLI
b. vSphere Remote Console and vTerminal
c. vSphere ESXi Control Center and vSphere Shell Interface
d. Remote Access Client (RAC) and vConsole
ANSWER: a
POINTS: 1
REFERENCES: Working with the ESXi Consoles
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
7. You are attempting to utilize a packet capturing software in your studies of a network's traffic, however, your
virtual machine running on vSphere is unable to put the network adapter in promiscuous mode. What is the
most likely reason for the failure?
a. A network security policy is preventing the use of a promiscuous mode interface.
b. vSphere does not support the use of promiscuous mode devices.
c. vSphere is connected to the network via a switch, and therefore cannot change to promiscuous mode.
d. The virtual machine hardware compatibility mode is limiting the virtual machine to legacy adapters.
ANSWER: a
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
Copyright Cengage Learning. Powered by Cognero. Page 2
Name: Class: Date:
8. What virtual machine configuration file holds the virtual machine's snapshot state information?
a. VM_name.vmsd
b. VM_name.vmss
c. VM_name.vswp
d. VM_name.vmdk
ANSWER: b
POINTS: 1
REFERENCES: Working with Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
9. What command can you use to add a comma separated list of users to an ESXi server using VCLI?
a. vicfg-user --adduser -l
b. viuser-cfg --add --type=user
c. vicfg-adduser
d. vicfg-user -u
ANSWER: d
POINTS: 1
REFERENCES: Working with the ESXi Consoles
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
10. A virtual machine providing services for your network was recently hacked and used to spoof MAC
addresses on your network to target other systems. What policies could you set to prevent this from
reoccurring?
a. The MAC address changes and forged transmits policies should be set to "Reject".
b. The promiscuous mode and MAC address changes policies should be set to "Reject".
c. The promiscuous mode and the forged transmits policies should be set to "Reject"
d. Only the promiscuous mode needs to be set to reject.
ANSWER: a
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 3
Name: Class: Date:
11. You are trying to support a VOIP application on a virtual machine, and need to prioritize VOIP traffic. What
kind of virtual switch policy should you use?
a. NIC teaming policy
b. traffic shaping policy
c. security policy
d. application priority policy
ANSWER: b
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
12. What traffic shaping policy option determines the max number of kilobits per second to allow across a port
when it is sending a burst of traffic?
a. burst size
b. average bandwidth
c. peak bandwidth
d. surge bandwidth
ANSWER: c
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
13. What traffic shaping policy option determines the number of kilobits per second to allow across a port,
averaged over time?
a. average bandwidth
b. average peak bandwidth
c. burst size
d. average throughput
ANSWER: a
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
Copyright Cengage Learning. Powered by Cognero. Page 4
Name: Class: Date:
14. When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file?
a. It is replaced by a .vmtx template configuration file.
b. It is supplemented by a .vmtx file, as both files are required to define the VM.
c. Nothing; vSphere templates are created using information in a sub directory of the VM.
d. It is modified to include the settings required for creating the template.
ANSWER: a
POINTS: 1
REFERENCES: Working with Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
15. What is NOT one of the valid choices available for ESXi's virtual SCSI adapter?
a. BusLogic Parallel
b. LSI Logic Parallel
c. LSI Logic SAS
d. BusLogic SAS
ANSWER: d
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
16. What are the two GUI clients provided by VMware for use with vSphere?
a. Direct Console User Interface (DCUI) and vSphere User Frontend
b. visual CLI and vSphere Client
c. vSphere Controller and vSphere Web Client
d. vSphere Web client and vSphere Client
ANSWER: d
POINTS: 1
REFERENCES: Working with the ESXi Consoles
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
18. You are using a gigabit Ethernet adapter (vmnic1) on an ESXi host, and you have found that the status
screen displays the adapter as being connected at 100 Mb, full duplex. You have verified that the switch your
server connects to has 1 Gbps capable ports. What is most likely the problem?
a. The adapter has been manually configured to a speed of 100 Mb, duplex operation.
b. The adapter's driver in ESXi does not have 1 Gbps capability.
c. The cable connecting the server and switch is damaged.
d. The virtual machine using vmnic1 has limited the speed of the interface.
ANSWER: a
POINTS: 1
REFERENCES: Configuring Virtual Switches
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
19. What sort of application might require the promiscuous mode security policy to be configured to "accept" in
order to support?
a. A web server with multiple virtual host configurations.
b. An e-mail server that utilizes load balancing features.
c. A clustered application that shares its IP address with other instances.
d. A network monitoring application such as an intrusion detection system (IDS).
ANSWER: d
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
Copyright Cengage Learning. Powered by Cognero. Page 6
Name: Class: Date:
20. You are configuring a Linux based 64-bit virtual machine for use on a vSphere host. Based on this
information, what will be the default network adapter type and why?
a. The default will be vmxnet to provide basic support for networking.
b. The vlance adapter will be used, because it is the most compatible.
c. The e1000 adapter type will be used, because it is the default for 64-bit guest operating systems.
d. The vmxnet3 adapter type will be used, because Linux has a built in driver.
ANSWER: c
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
21. While using vSphere for free, you are limited to how many virtual CPUs?
a. 1
b. 8
c. 32
d. 128
ANSWER: b
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
22. What virtual disk file type takes the longest to create?
a. thick provision lazy zeroed
b. thick provision eager zeroed
c. thin provision lazy zeroed
d. independent provision
ANSWER: b
POINTS: 1
REFERENCES: Creating Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
23. What type of virtual switch exists only within a single vSphere hypervisor?
Copyright Cengage Learning. Powered by Cognero. Page 7
Name: Class: Date:
25. A security policy has been applied to an individual port on a virtual switch. The switch itself has a
conflicting policy configured. What setting has priority?
a. The settings at the virtual switch level will have priority, as the policy is inherited by the port.
b. The settings on the port will have priority, because the policy is overridden at the port level.
c. The overall setting will be disabled until the conflicting settings are manually changed.
d. The more restrictive setting will be used automatically.
ANSWER: b
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
26. What virtual network adapter type should you use if you need to support fault tolerance as well as
record/replay for network traffic?
Copyright Cengage Learning. Powered by Cognero. Page 8
Name: Class: Date:
27. Under what conditions might a virtual machine have a lock file?
a. A lock file can exist when a raw device mapping is utilized.
b. Lock files are used when a thin provisioned disk is configured.
c. Lock files are used when an IDE controller is configured for a virtual machine.
d. A lock file can exist when a virtual machine is stored on an NFS based data store.
ANSWER: d
POINTS: 1
REFERENCES: Working with Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
28. What configuration file name would be assigned to the Raw Device Map (RDM) pointer file for a VM
named Srv1?
a. Srv1.vmdk.rdm
b. Srv1.vswp
c. Srv1.rdm.vmdk
d. Srv1.rdm.vswp
ANSWER: c
POINTS: 1
REFERENCES: Working with Virtual Machines
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
29. How many archive logs are maintained for a virtual machine at any one time?
a. two
30. What is the maximum number of vCPUs supported by the fully licensed version of the vSphere hypervisor?
a. 8 vCPUs
b. 16 vCPUs
c. 64 vCPUs
d. 128 vCPUs
ANSWER: d
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
Matching
31. A console interface that can be used to interact with an ESXi server host.
ANSWER: a
POINTS: 1
32. The process of assigning more disk space to virtual disks that you have space available on a VMFS data
store.
ANSWER: b
POINTS: 1
33. A file stored in a VMFS volume that acts as a proxy or go-between providing a physical storage device to
virtual disk mapping.
ANSWER: c
POINTS: 1
34. Allows the administrator to set up rules and procedures to manage how virtual network resources are used.
ANSWER: d
POINTS: 1
35. Allocates the space required for a virtual machine during creation. Data remaining on the physical device is
zeroed out when the disk is created.
ANSWER: e
POINTS: 1
36. Space required for a virtual disk is allocated during creation, but data remaining on the physical device is
not erased during creation, it is zeroed out over time.
ANSWER: f
POINTS: 1
37. Uses only as much data store space as the disk initially needs.
ANSWER: g
POINTS: 1
38. As an example, this is used by a physical switch to pass packets from multiple VLANs to a host using
VLAN tags.
ANSWER: h
POINTS: 1
40. The next generation of a paravirtualized NIC, designed for performance and advanced features such as fault
tolerance.
Copyright Cengage Learning. Powered by Cognero. Page 11
Name: Class: Date:
42. When defining the network security policy, what security exceptions are you allowed to set, and what do
they do?
ANSWER: The network security policy allows the administrator to set the following security exceptions:
* Promiscuous Mode—When set to Reject, placing a guest adapter in promiscuous mode has no
effect on which frames are received by the adapter (default is Reject).
* MAC Address Changes—When set to Reject, if the guest attempts to change the MAC address
assigned to the virtual NIC, it stops receiving frames (default is Accept).
* Forged Transmits—When set to Reject, the virtual NIC drops frames that the guest sends, where
the source address field contains a MAC address other than the assigned virtual NIC MAC address
(default is Accept).
POINTS: 1
REFERENCES: Virtual Network Switch Policies
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
43. What are the three options available when configuring a traffic shaping policy?
ANSWER: The three options for configuring a traffic shaping policy are as follows:
* Average bandwidth--Establishes the number of kilobits per second to allow across a port, averaged
over time. The average bandwidth is the allowed average load.
* Peak bandwidth--The maximum number of kilobits per second to allow across a port when it is
sending a burst of traffic. This number tops the bandwidth that is used by a port whenever the port is
using its burst bonus.
* Burst size--Size—The maximum number of kilobytes to allow in a burst. If this parameter is set, a
port might gain a burst bonus if it does not use all its allocated bandwidth.
POINTS: 1
44. What are the three different types of ports that exist on a virtual switch?
ANSWER: The three types of ports on a virtual switch are: virtual machine ports, VMkernel ports, and uplink
ports. Virtual machine ports are used to handle traffic between virtual machines and between virtual
machines and the physical network. VMkernel ports include the management network port used to
connect to remote consoles such as the vSphere Client, as well as ports for network storage, vMotion
migration, and fault tolerance. Uplink ports are used to connect one or more physical network
adapters to the virtual switch.
POINTS: 1
REFERENCES: Configuring Virtual Switches
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
46. What level of support does vSphere 6 provide for USB devices, and how can they be used with vSphere?
ANSWER: vSphere 6 supports USB 3.0 devices in virtual machines, allowing devices such as smart-card readers
and flash drives to be attached. Since USB devices cannot be connected directly to the ESXi host
computer, connecting a USB drive to your virtual machine requires connecting the USB device to a
desktop computer running the VMware vSphere® Web Client application or the vSphere Client. The
virtual machine can then access the USB device from the client computer.
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
Copyright Cengage Learning. Powered by Cognero. Page 13
Name: Class: Date:
47. What is the vmxnet3 virtual network adapter, and what features does it provide?
ANSWER: The vmxnet3 adapter is the next generation of a paravirtualized NIC designed for performance. It is
not related to vmxnet or vmxnet2. The vmxnet3 adapter offers all the features available in vmxnet2
and adds several features, like multiqueue support (called Receive-Side Scaling in Windows), IPv6
offloads, and MSI/MSI-X interrupt delivery. vmxnet3 devices support fault tolerance and
record/replay.
POINTS: 1
REFERENCES: Virtual Hardware Components
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
48. What are some of the benefits of thin provisioning virtual disk files?
ANSWER: Thin provisioning enables virtual machines to use storage space as needed, further reducing the cost
of storage for virtual environments considerably. Thin provisioning is often used with storage array
deduplication to improve storage use and to backup virtual machines. Thin provisioning can be
configured to provide alarms and reports to track current usage of storage capacity as well as
allowing a storage administrator to optimize the allocation of storage for virtual environments.
POINTS: 1
REFERENCES: Creating Virtual Machines
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
49. What is a raw device mapping (RDM), and when is it recommended that it be used?
ANSWER: Instead of storing virtual machine data in a virtual disk file stored on a VMFS data store, when using
an RDM disk the guest operating system stores data directly on a the host computer’s storage (local
or SAN). Storing the data this way may provide faster data access and is useful if you are running
applications in your virtual machines that must know the physical characteristics of the storage
device. An RDM is recommended when a virtual machine must interact with data on the actual local
disk on the SAN.
POINTS: 1
REFERENCES: Creating Virtual Machines
QUESTION TYPE: Subjective Short Answer
HAS VARIABLES: False
DATE CREATED: 3/2/2017 10:48 PM
DATE MODIFIED: 3/2/2017 10:48 PM
50. What are the three major virtual disk file types, and how do they differ?
ANSWER: The three major virtual disk file types are as follows:
* Thick Provision Lazy Zeroed--Space required for the virtual disk is allocated during creation. Data
remaining on the physical device is not erased during creation, but is zeroed out on demand at a later
time on first write from the virtual machine.
Copyright Cengage Learning. Powered by Cognero. Page 14
Name: Class: Date: