Download VIRTUALIZATION FINAL EXAM QUESTIONS AND ANSWERS and more Exams Social Sciences in PDF only on Docsity! VIRTUALIZATION FINAL EXAM QUESTIONS AND ANSWERS You are trying to provision a virtual machine within VirtualBox to allow for remote access over the network, and wish to configure authentication for the remote display extension. Where do you find these settings? a. They are found within the Display section under Preferences for the VM. b. The settings for authentication are found within the File Menu, under "Remote Access Config". c. They are found within the Network section under Preferences for the VM. d. They are found within the General section under Preferences for the VM. - Answers - d. They are found within the General section under Preferences for the VM. A virtual machine is being migrated to VirtualBox, and you are examining the requirements for the virtual machine. One requirement in particular is that the virtual machine must be able to use up to seven serial ports. Will the migration be successful? a. Yes, VirtualBox can use duplexing to serve a maximum of 16 serial ports. b. No, VirtualBox does not support the use of serial ports within a VM. c. No, VirtualBox can only support 4 serial ports max. d. Yes, VirtualBox supports an unlimited number of serial ports within a VM. - Answers - a. No, VirtualBox can only support 4 serial ports max. You have just configured a virtual machine using default options where possible and turned it on for the first time. You discover the IP address of the guest is outside the IP address range of your physical network, but is still able to communicate with the Internet. What is the explanation for the difference in IP address? a. The network adapter for the virtual machine is utilizing the VMnet1 virtual switch. b. The network adapter for the virtual machine is using the host-only switch. c. The network adapter for the virtual machine is using the default NAT switch option. d. The network adapter for the virtual machine is operating in bridged mode, by default. - Answers -c. The network adapter for the virtual machine is using the default NAT switch option. What VMware Workstation 12 Pro feature allows a host to separate applications from a virtual machine so that they can be run without the VMware interface? a. vApp mode b. Unity mode c. Fusion mode d. VM Share mode - Answers -b. Unity mode With VMware Workstation 12 Pro, you can modify the amount of RAM or the number of virtual processors used by a virtual machine while it is in use. True False - Answers -False What hypervisor uses a special guest called Domain 0 that loads along with the hypervisor and is used to directly access the hardware? a. Oracle VirtualBox b. VMWare ESXi c. VMWare Workstation d. Xen - Answers -d. Xen The hypervisor intercepts and processes requests coming from the guest operating systems and then returns the results back to the virtual machine. True False - Answers -True Under what menu within VirtualBox can the "Discard Saved State" be found? a. Settings menu b. Preferences menu c. Machine menu d. File menu - Answers -c. Machine menu What is NOT a product designed specifically for the virtualization of applications within a VDI environment? a. Altiris Software Virtualization Solution b. VMware Fusion c. VMware ThinApp d. Microsoft App-V - Answers -b. VMware Fusion Which of the following does an operating system installed in a guest virtual machine do? a. controls the hypervisor b. interacts directly with host machine hardware c. intercepts requests for an emulated hard drive d. interacts with hardware through the hypervisor - Answers -d. interacts with hardware through the hypervisor VMware Workstation 12 is only compatible with VMware Fusion version 9 or later. True b. A Network Attached Storage device c. An iSCSI network d. A network shared folder - Answers -c. An iSCSI network A dynamically allocated virtual hard disk file will grow and shrink to meet the needs of the virtual machine. True False - Answers -False You have restored a snapshot on a VMware Workstation 12 Pro based virtual machine, only to discover that after reverting, an independent disk has not been reverted. What is the issue? a. The disk is connected to another virtual machine that was not included in the snapshot. b. The disk is set to persistent mode, causing the data to persist across snapshots. c. Independent disks are not included in snapshots. d. The disk is set to non-persistent mode, so the data stored on it is lost when the VM is powered down. - Answers -c. Independent disks are not included in snapshots. When using VMware Workstation 12 Pro Tools in a VM, the host machine's printers are added to the virtual machine. How is this accomplished? a. VMware Tools adds the printers using the drivers installed on the host, and installs them in the guest as well. b. VMware tools creates a virtual serial port to attach the printers. c. VMware Tools adds the printers using virtual network adapters, making the printers appear to be network printers. d. VMware Tools uses a named spooling file in the host to pass data. - Answers -b. VMware tools creates a virtual serial port to attach the printers. What component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each guest available for other virtual machines or the host computer? a. The BIOS b. The host operating system c. The guest operating system d. The hypervisor - Answers -d. The hypervisor When a VirtualBox VM is in full screen mode, you can exit full screen mode by pressing Right Ctrl + Home. True False - Answers -False What virtual switch, created by default with VMware Workstation 12 Pro, is used to connect a virtual machine to the host computer via NAT? a. VMnet0 b. VMnet5 c. VMnet1 d. VMnet8 - Answers -d. VMnet8 What does the AutoProtect feature do within VMware Workstation Pro 12? a. It prevents a virtual machine from being deleted from the host. b. It protects a virtual machine's configuration files from modification. c. It automatically takes snapshots at a given interval to enable quick recovery. d. It enables virtual machine security protections when the VM is connected to a network. - Answers -c. It automatically takes snapshots at a given interval to enable quick recovery. What is the maximum number of network adapters that can be configured for a virtual machine running in VirtualBox? a. one b. two c. four d. three - Answers -c. four An ISO image file uses what format to store a disc's contents in a single file on a computer? a. ISO 1040 b. Binary format (BIN) c. ISO 9660 d. Disc encoded structure format - Answers -c. ISO 9660 Operating systems are grouped by type within the VirtualBox Manager. True False - Answers -True The number of snapshots that can be supported for an individual VM is limited only by the amount of disk space available. True False - Answers -True The installation of VMware Workstation 12 Pro can be automated utilizing the msiexec.exe program. True False - Answers -True Cloud services are highly reliant upon the use of virtualization technology. True False - Answers -True While using a linked clone, what option should be enabled to ensure the parent or snapshot is not deleted or changed? a. The AutoProtect option should be enabled. b. The VDI mode should be enabled on the linked clone. c. The non-persistent mode should be enabled on the independent disk associated with the clone. d. The template option should be enabled on the parent. - Answers -d. The template option should be enabled on the parent What format enables a virtual machine to be moved between virtualization platforms, and is often used for deploying virtual appliances? a. Open Virtualization Format (OVF) b. Shared Virtualization System (SVS) c. Virtual Machine Disk (VMDK) d. Virtual Disk Image (VDI) - Answers -a. Open Virtualization Format (OVF) Many of the concepts used in today's virtualization products date back to IBM mainframe computers for the 1970s. True False - Answers -True When utilizing UEFI in VMware, what is the oldest version of Windows that can be installed? a. Windows XP b. Windows 8 c. Windows 7 When using the VMware Horizon software, where do client desktop operating systems run? a. They run on a VMware vSphere ESXi host. b. They run on a Citrix XenServer. c. They run on a host running VMware Workstation Pro. d. They run on a Windows Server 2012 or later host using Hyper-V - Answers -a. They run on a VMware vSphere ESXi host. What statement regarding virtual disk types is accurate? a. A dynamic disk is only suitable for hosts with large amounts of storage to accommodate their size. b. A fixed size virtual disk has reduced performance in comparison to a dynamic disk. c. A dynamic disk does not immediately allocate the configured size of the disk. d. A fixed size virtual disk does not immediately allocate the configured size of the disk. - Answers -c. A dynamic disk does not immediately allocate the configured size of the disk. d. A fixed size virtual disk does not immediately allocate the configured size of the disk. Under what menu within VirtualBox can a virtual appliance be exported? a. Machine Menu b. Settings Menu c. File Menu d. Preferences Menu - Answers -c. File Menu The number of snapshots that can be supported for an individual VM is limited only by the amount of disk space available. True False - Answers -True While using VMware Workstation 12 Pro, you notice that virtual machine performance is starting to slow. Upon further investigation, you discover that the virtual machines are causing paging on the host, despite plenty of RAM being available. What should you do to improve performance? a. Disable the page file in the guest OS. b. Use the "Fit all virtual machine memory into reserved host RAM" option. c. Disable the host's page file. d. Increase the amount of RAM available to the guest VM. - Answers -b. Use the "Fit all virtual machine memory into reserved host RAM" option. Use of the Shared Clipboard and Drag'n'Drop features of VirtualBox does not require the installation of Guest Additions tools. True False - Answers -False Where can the option to enable Unity mode be found? a. File menu b. Menu tool bar c. View menu d. Edit menu - Answers -b. Menu tool bar What does the PAE/NX option do when it is enabled? a. It enables the ability for virtual network cards to reach 1 gbps throughput. b. It enables 32-bit operating systems to access more than 4 GB of RAM. c. It allows for the use of virtual disks larger than 2 TB in size. d. It prevents a virtual machine guest from accessing the memory of another guest. - Answers -b. It enables 32-bit operating systems to access more than 4 GB of RAM. You have finished configuring the Remote Display extension for VirtualBox, and must instruct a user on how to connect to the host. What protocol must the user utilize to communicate using this extension? a. RDP b. RAW c. RMP d. VNC - Answers -a. RDP You are storing a virtual disk on a partition that is FAT32 formatted. What option in VMware Workstation 12 Pro should you select to avoid the limitations of FAT32? a. Do not use advanced permissions on disk files b. Allocate all disk space now c. Split virtual disk into multiple files d. Store virtual disk as a single file - Answers -c. Split virtual disk into multiple files What type of cloud computing service provides hardware infrastructure along with necessary operating system software for running client applications? a. Platform as a Service b. Infrastructure as a Service c. Hardware as a Service d. Software as a Service - Answers -a. Platform as a Service When in the Virtual Machine Hardware Compatibility window of VMware Workstation 12 Pro, what checkbox should be selected to provide compatibility for migration of the virtual machine to the vSphere Hypervisor? a. Hyper-V Server compatibility b. Oracle compatibility c. XenWorks compatibility d. ESX Server compatibility - Answers -d. ESX Server compatibility What statement regarding the use of Hyper-V is accurate? a. Hyper-V can only be used to host Microsoft based virtual machines. b. Hyper-V requires a 64-bit processor with hardware virtualization support. c. Hyper-V does not include support for PATA based disk systems. d. Hyper-V includes native support for USB devices. - Answers -b. Hyper-V requires a 64-bit processor with hardware virtualization support. What configuration setting determines the maximum screen resolution and number of colors for a VM? a. PRAM b. RAM c. PAE/NX d. Video RAM - Answers -d. Video RAM When a Xen based guest VM makes a request for a hardware resource, such as reading from a disk, where is the request sent to? a. It is sent to the host operating system, which then handles the request. b. It is sent directly to the hardware on the host machine. c. It is queued into the guest VM's I/O page table. d. It is sent to the Domain 0 guest. - Answers -d. It is sent to the Domain 0 guest. When working with the toolbar for VirtualBox, what does the "Discard" setting do? a. It discards the saved state of the virtual machine and starts the virtual machine fresh. b. It discards the current virtual machine running state, turning the virtual machine off. c. It discards the contents of the virtual machine's memory. d. It discards the entire virtual machine, removing it from the host. - Answers -a. It discards the saved state of the virtual machine and starts the virtual machine fresh. You are planning to install a Windows 7 guest operating system on a virtual hard disk using VMware Workstation 12 Pro, and you intend to use a partition that is 3 TB in size. What should you do to ensure that the partition is bootable? a. Use a UEFI firmware type. While modifying a disk image within VirtualBox, what mode allows for multiple virtual machines to share a single disk image at the same time, as well as store the changes unique to each VM? a. Writethrough mode b. Normal mode c. Shareable mode d. Multi-attach mode - Answers -d. Multi-attach mode What is the oldest version of Windows Server to support the use of Microsoft's Hyper-V product? a. Windows Server 2016 b. Windows Server 2008 c. Windows Server 2003 d. Windows Server 2012 - Answers -b. Windows Server 2008 Unity is a VMware Workstation 12 Pro function that enables you to run applications from a virtual machine as though the applications are running on the host. True False - Answers -True What is the purpose of the NX/XD CPU feature present in most modern Intel and AMD processors? a. The feature allows for the use of virtual peripheral devices. b. The feature enables the use of virtualization on the CPU. c. The feature adds a layer of security by marking areas of memory as non-executable. d. The feature increases the efficiency of RAM when used with virtual machines. - Answers -c. The feature adds a layer of security by marking areas of memory as non- executable. When modifying a disk image in VirtualBox, what mode provides full access to the guest OS to read and write, so that when a snapshot is created, the state of the disk is also saved with it? a. Writethrough mode b. Immutable mode c. Normal mode d. Shareable mode - Answers -c. Normal mode d. Shareable mode In VMware workstation Pro, by default, the new VM wizard will set the memory amount to what is recommended by the OS you are installing. True False - Answers -True Where can you manually connect a USB device to a virtual machine on VMware Workstation 12 Pro? a. The device can be added via the "Manage VM" screen. b. From the Preferences menu, select "Attach USB device", select the desired device. c. In the virtual machine's settings, under the USB controller, click "Add" to add the device. d. From the VM menu, select Removable Devices, then attach the USB device. - Answers -d. From the VM menu, select Removable Devices, then attach the USB device. (*untested) What does the "ACPI Shutdown" option from the Machine menu do? a. It creates a saved state for the VM and then powers it off. b. It performs a safe and proper shutdown of the VM. c. It forces the VM to immediately power off. d. It suspends the virtual machine using the ACPI shutdown command. - Answers -b. It performs a safe and proper shutdown of the VM. What feature, supported by VMWare, allows the live migration of a running VM from one host to another? a. vMigration b. vMove c. vMotion d. vTarget - Answers -c. vMotion While modifying a disk image within VirtualBox, what mode causes the state of the disk image to not be saved when a snapshot is created, and not restored when a snapshot is reverted back? a. Normal mode b. Immutable mode c. Writethrough mode d. Shareable mode - Answers -c. Writethrough mode d. Shareable mode What option is a valid choice when choosing the adapter type for a SCSI adapter within VMware Workstation 12 Pro? a. Parallel Logic b. LSI logic c. ATAPI d. ATA Logic - Answers -b. LSI logic Your work environment consists of a large number of Mac OS X based devices. The developers in your network have requested virtualization software be installed for their use. What product should you use? a. Xen b. Hyper-V c. VMware Workstation d. VMware Fusion - Answers -d. VMware Fusion You are getting ready to deploy a virtual machine on a Hyper-V host, and have come to the "Specify Generation" window. What generation should you select if your virtual machine will have a 32-bit guest OS? a. generation one b. Neither generations will support a 32-bit operating system. c. generation two d. Both generations will support a 32-bit operating system. - Answers -a. generation one What type of virtual switch exists only within a single vSphere hypervisor? a. standard b. independent c. isolated d. distributed - Answers -a. standard What is not a valid requirement for the installation of VirtualBox? a. The host must have at least 30 MB disk space. b. The host must support hardware virtualization. c. The host must have at least 512 MB of RAM. d. The host must have a recent Intel or AMD x86 CPU. - Answers -b. The host must support hardware virtualization. VMware vSphere 6 provides support for USB 3.0 devices in virtual machines. a. average throughput b. average peak bandwidth c. average bandwidth d. burst size - Answers -c. average bandwidth What virtual network adapter type should you use if you need to support fault tolerance as well as record/replay for network traffic? a. vmxnet2 b. vmxnet3 c. e1000 d. vlance - Answers -b. vmxnet3 You are attempting to utilize a packet capturing software in your studies of a network's traffic, however, your virtual machine running on vSphere is unable to put the network adapter in promiscuous mode. What is the most likely reason for the failure? a. vSphere is connected to the network via a switch, and therefore cannot change to promiscuous mode. b. A network security policy is preventing the use of a promiscuous mode interface. c. vSphere does not support the use of promiscuous mode devices. d. The virtual machine hardware compatibility mode is limiting the virtual machine to legacy adapters. - Answers -b. A network security policy is preventing the use of a promiscuous mode interface. When running the vmkfstools command with the --server option pointing to a vCenter Server system, what option should be used to select the proper ESXi host to run the command against? a. --vihost b. --esxi c. --targethost d. --destsrv - Answers -a. --vihost NIC teaming policies are set for an entire standard switch, and cannot be changed at the port group level. True False - Answers -False What virtual disk file type takes the longest to create? a. thick provision lazy zeroed b. thick provision eager zeroed c. thin provision lazy zeroed d. independent provision - Answers -b. thick provision eager zeroed A security policy has been applied to an individual port on a virtual switch. The switch itself has a conflicting policy configured. What setting has priority? a. The settings on the port will have priority, because the policy is overridden at the port level. b. The overall setting will be disabled until the conflicting settings are manually changed. c. The more restrictive setting will be used automatically. d. The settings at the virtual switch level will have priority, as the policy is inherited by the port. - Answers -a. The settings on the port will have priority, because the policy is overridden at the port level. Under what conditions might a virtual machine have a lock file? a. Lock files are used when a thin provisioned disk is configured. b. Lock files are used when an IDE controller is configured for a virtual machine. c. A lock file can exist when a virtual machine is stored on an NFS based data store. d. A lock file can exist when a raw device mapping is utilized. - Answers -c. A lock file can exist when a virtual machine is stored on an NFS based data store. A virtual machine providing services for your network was recently hacked and used to spoof MAC addresses on your network to target other systems. What policies could you set to prevent this from reoccurring? a. The MAC address changes and forged transmits policies should be set to "Reject". b. Only the promiscuous mode needs to be set to reject. c. The promiscuous mode and the forged transmits policies should be set to "Reject" d. The promiscuous mode and MAC address changes policies should be set to "Reject". - Answers -a. The MAC address changes and forged transmits policies should be set to "Reject". What are the two major console interfaces used to work with an ESXi host? a. vSphere Remote Console and vTerminal b. Remote Access Client (RAC) and vConsole c. vSphere ESXi Control Center and vSphere Shell Interface d. Direct Console User Interface (DCUI) and vCLI - Answers -d. Direct Console User Interface (DCUI) and vCLI You are using a gigabit Ethernet adapter (vmnic1) on an ESXi host, and you have found that the status screen displays the adapter as being connected at 100 Mb, full duplex. You have verified that the switch your server connects to has 1 Gbps capable ports. What is most likely the problem? a. The adapter has been manually configured to a speed of 100 Mb, duplex operation. b. The cable connecting the server and switch is damaged. c. The adapter's driver in ESXi does not have 1 Gbps capability. d. The virtual machine using vmnic1 has limited the speed of the interface. - Answers - a. The adapter has been manually configured to a speed of 100 Mb, duplex operation. The e1000 network adapter type is the default adapter used by vSphere for virtual machines that run 64-but guest operating systems. True False - Answers -True What traffic shaping policy option determines the max number of kilobits per second to allow across a port when it is sending a burst of traffic? a. peak bandwidth b. average bandwidth d. distributed - Answers -c. standard What is NOT one of the valid choices available for ESXi's virtual SCSI adapter? a. BusLogic Parallel b. LSI Logic Parallel c. LSI Logic SAS d. BusLogic SAS - Answers -d. BusLogic SAS What is the maximum number of vCPUs supported by the fully licensed version of the vSphere hypervisor? a. 8 vCPUs b. 128 vCPUs c. 16 vCPUs d. 64 vCPUs - Answers -b. 128 vCPUs When a virtual machine is converted to a template on vSphere, what happens to the .vmx configuration file? a. Nothing; vSphere templates are created using information in a sub directory of the VM. b. It is supplemented by a .vmtx file, as both files are required to define the VM. c. It is modified to include the settings required for creating the template. d. It is replaced by a .vmtx template configuration file. - Answers -d. It is replaced by a .vmtx template configuration file. While using vSphere for free, you are limited to how many virtual CPUs? a. 8 b. 32 c. 128 d. 1 - Answers -a. 8 You are trying to support a VOIP application on a virtual machine, and need to prioritize VOIP traffic. What kind of virtual switch policy should you use? a. traffic shaping policy b. security policy c. application priority policy d. NIC teaming policy - Answers -a. traffic shaping policy A standard vSphere virtual switch can have a maximum of 120 ports. True False - Answers -False Each VMkernel port must be configured with its own IP address and gateway. True False - Answers -True What term is used to describe the top most object in the vCenter Server inventory? a. root object b. head node c. top host d. primary branch - Answers -a. root object You are attempting to migrate a virtual machine to a different host. The new host has an Intel processor, while the old host has an AMD processor. What type of migration must be performed? a. cold migration b. suspended migration c. Enhanced vMotion migration d. vMotion migration - Answers -a. cold migration What statement regarding the vpxa process is accurate? a. The vpxa process controls access to the virtual machines and storage volumes on an ESXi host. b. The vpxa process serves as an intermediary between the vpxd process and the hostd process. c. The vpxa process is responsible for managing most of the operations on the ESXi host. d. The vpxa process communicates commands from the vSphere client to the hostd process. - Answers -b. The vpxa process serves as an intermediary between the vpxd process and the hostd process. What is NOT a part of the VMware platform services component of vCenter Server? a. License service b. Inventory database service c. Lookup service d. vCenter Single Sign On - Answers -b. Inventory database service What happens when ESXi hosts are put into lockdown mode? a. No users are able to log into ESXi hosts through vCenter, they must log in directly. b. No users are able to log into ESXi hosts, they must authenticate with vCenter Server. c. The ESXi server no longer allows virtual machine modifications or changes in running state. d. The ESXi internal firewall is enabled, and only approved IPs in an access list can access the server. - Answers -b. No users are able to log into ESXi hosts, they must authenticate with vCenter Server. What is the maximum number of extents that can be added to any VMFS data store? a. 32 b. 64 c. 8 d. 16 - Answers -a. 32 c. vCenter Server requires 240 GB IDE drive space d. vCenter Server requires two CPU cores minimum. - Answers -d. vCenter Server requires two CPU cores minimum. What process is responsible for managing most of the operations on an ESXi host? a. vpxd b. vpxa c. kernd d. hostd - Answers -d. hostd Smaller organizations can use which of the following vCenter Server's built in database to manage data center objects? a. Oracle DB b. MySQL Server c. PostgreSQL Server d. Microsoft SQL Server - Answers -c. PostgreSQL Server What is a disadvantage of utilizing a Storage Area Network (SAN) over a Network Attached Storage (NAS)? a. A SAN cannot make use of the iSCSI protocol. b. A typical NAS has better performance than a SAN. c. A SAN is more costly to implement. d. A SAN lacks the more advanced features of a NAS. - Answers -c. A SAN is more costly to implement. During installation, the vCenter Server appliance sets up a Single Sign On account using what username? a. manager@domain_name b. admin@domain_name c. administrator@domain_name d. root@domain_name - Answers -c. administrator@domain_name What guest operating system information does not typically require modification when creating a template? a. The guest OS network settings b. The guest OS hostname c. The guest OS partition layout d. The guest OS license settings - Answers -c. The guest OS partition layout What statement regarding the use of lockdown mode is accurate? a. The root user is still able to log in via the DCUI console. b. The lockdown mode only affects the use of the vCLI. c. The vCLI and DCUI options are still available for use by any user. d. A user may access ESXi hosts individually as long as they are members of the "Local Admins" role. - Answers -a. The root user is still able to log in via the DCUI console. What is used by CHAP to verify the identity of a host? a. Pre-approved host list b. A three way handshake and private keys c. network MAC address database d. host certificates - Answers -b. A three way handshake and private keys The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server. True False - Answers -True What term is used to describe the ability to perform a specific action or read a specific property in vCenter Server? a. trait b. privilege c. role d. ability - Answers -b. privilege Implementing vCenter Server as a stand-alone Linux appliance still requires an Active Directory domain controller. True False - Answers -False You would like to migrate a powered on virtual machine to a new data store and a new host. What type of migration should you use? a. cold migration b. enhanced vMotion c. suspended migration d. vMotion migration - Answers -b. enhanced vMotion The vCenter Server Linux appliance has a built-in PostgreSQL database that can be used instead of a Microsoft SQL server. True False - Answers -True What is a valid step that should be taken to make using iSCSI technology on a network more secure? a. The iSCSI traffic should be encrypted using CHAP. b. The network switches used for the SAN should be iSCSI aware such that they properly hide iSCSI traffic. c. The iSCSI traffic should be isolated to a dedicated and separate network. d. The network should make use of hardware based iSCSI instead of software based iSCSI. - Answers -c. The iSCSI traffic should be isolated to a dedicated and separate network. a. The host should be placed in a special VLAN along with the storage to isolate access. b. The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services. c. The host should be configured to use the same virtual network switch for both accessing shared storage and providing services. d. The host should be configured to use separate network adapters for accessing storage and providing services. - Answers -d. The host should be configured to use separate network adapters for accessing storage and providing services. Both versions of the .NET Framework required by the Virtual Machine Manager are installed on Windows Server 2016 by default. True False - Answers -False You have established a baseline using Windows Server Update Services, and would like to check the compliance status of all VMM servers. Where can you find this information in VMM Console? a. Under the Settings workspace, go to the "Reports" section, click "View compliance report" b. In the Library workspace, select all servers, right click, select "Show compliance details" c. Under the Jobs workspace, create a new job, select "Check compliance". d. In the Fabric ribbon, on the Servers node, select "Compliance". - Answers -d. In the Fabric ribbon, on the Servers node, select "Compliance". When creating a hardware profile, what do the settings under "Availability" do? a. They determine what users are able to access the profile within VMM. b. They determine the availability of hardware resources that can be dedicated to the virtual machine. c. They determine whether a virtual machine is placed on a server that is a member of a cluster, to provide high availability. d. They limit the access over the network to the virtual machine by deploying it to servers with specific access policies. - Answers -c. They determine whether a virtual machine is placed on a server that is a member of a cluster, to provide high availability. When using Microsoft Hyper-V, what type of virtual switch should you utilize if you want to limit communication of a virtual machine to only virtual machines running on the host? a. internal virtual switch b. private virtual switch c. local virtual switch d. external virtual switch - Answers -b. private virtual switch Which of the following is NOT considered one of the three major components of the Virtual Machine Manager? a. VMM Management Server b. VMM Local Agent c. VMM Console d. VMM Service Account - Answers -d. VMM Service Account You are attempting to move a vSphere virtual machine stored in a VMFS formatted iSCSI volume to a workstation running VMware Workstation 12 Pro. What must be done to the VM before it can be moved? a. The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application. b. The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location. c. Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved. d. The virtual disk must be converted to a .vmdk file prior to it being moved from the volume. - Answers -c. Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved. What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the other phases? a. exploitation phase b. scanning phase c. reconnaissance phase d. pivoting phase - Answers -a. exploitation phase What feature, available in Windows 7 and Windows Server 2008 and later allows the guest OS to communicate directly with a hypervisor, for increased features and improved performance? a. Second Level Address Translation (SLAT) b. Enlightened I/O c. Non-Uniform Memory Access (NUMA) d. Transparent Page Sharing - Answers -b. Enlightened I/O You are configuring a backup program for a server that hosts Hyper-V based virtual machines. One of your required locations to back up is the folder containing the virtual machine configuration files. Where are these located? a. C:\Users\Public\Documents\Windows\Hyper-V b. C:\Users\Public\Documents\Hyper-V c. C:\Users\Public\AppData\Microsoft\Windows\Hyper-V d. C:\ProgramData\Microsoft\Windows\Hyper-V - Answers -d. C:\ProgramData\ Microsoft\Windows\Hyper-V You are attempting to install a Windows Server 2008 guest OS to a SCSI based drive within a generation one virtual machine, however, you find you are unable to perform the install. What is the reason for this failure? a. Windows Server 2008 does not support the virtual SCSI controller used by generation one VMs in Hyper-V. b. A SCSI based drive can't be added to a generation one virtual machine. c. Generation one virtual machines do not support a non-IDE based boot drive. b. The default gateway should be configured to 169.254.1.1 in order to access the network. c. The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address. d. The virtual machine is using the wrong subnet mask for the class of IP address configured. - Answers -c. The virtual machine has failed to receive an IP address from a DHCP server, and has resorted to an APIPA address. Hyper-V supports the use of a physical floppy drive within virtual machines, much the same way a physical DVD drive can be used to support discs. True False - Answers -False The creation of a baseline for checking if a VMM server has all required patches requires the use of what Microsoft service? a. Windows Server Update Services b. Network Health role c. VMM Monitor role d. Microsoft Baseline Reporting - Answers -a. Windows Server Update Services The VMM console can be installed on different computers throughout a network, but they can only manage one VMM server at a time. True False - Answers -True What advanced virtual hard disk format, introduced by Windows Server 2012 R2, provides increased storage capacity of up to 64 TB per VM disk, improved performance, and security? a. VMDK b. VHDX c. VDI d. VHD - Answers -b. VHDX When a virtual machine in Hyper-V is saved from the Action menu, where is the virtual machine's memory and state information saved to? a. They're both saved to a file on the host computer b. They're both saved to the virtual machine's configuration file. c. They're both saved to the virtual machine's virtual hard disk file. d. They're both saved to the guest OS's page file, much like a traditional suspend operation. - Answers -a. They're both saved to a file on the host computer What is the file name used for an answer file for Windows Vista or Windows Server 2008 or newer? a. Unattend.xml b. Unattend.ini c. answer.txt d. Custom.bat - Answers -a. Unattend.xml A user has asked for your assistance in restoring the wizard windows and confirmation messages that they've checked the "Do not show this again" option. Where can this setting be found? a. Under the Hyper-V Settings dialog box, within the "User" section. b. Under the Actions menu, "Reset Check Boxes" option. c. Under the virtual machine settings window, in the "Management" section. d. Under the Hyper-V Settings dialog box, within the "Server" section. - Answers -a. Under the Hyper-V Settings dialog box, within the "User" section. When using the Hyper-V hypervisor, what is the default mouse release key combination that will transfer mouse control from the VM back to the host? a. Ctrl + Alt + left arrow b. Ctrl + Home c. Ctrl + Alt + Insert d. Ctrl + Enter - Answers -a. Ctrl + Alt + left arrow A NIC can be assigned to more than one virtual switch. True False - Answers -False What are the two different types of checkpoints? a. Production and standby b. Primary and secondary c. Standard and production d. Supplemental and tertiary - Answers -c. Standard and production Under the Fabric ribbon within the Storage node, where can you create a policy that assigns storage classifications to actual performance metrics, such as maximum bandwidth and IOPS? a. Create Storage Performance Policy b. Create Storage Classification c. Create Storage Access Policy d. Create Storage QoS Policy - Answers -d. Create Storage QoS Policy What version of Windows Server 2016 does not include the Hyper-V role? a. Windows Server 2016 Datacenter b. Windows Server 2016 Web c. Windows Server 2016 Essentials d. Windows Server 2016 Standard - Answers -c. Windows Server 2016 Essentials What statement regarding the use of an IDS is not accurate? a. An IDS can detect a virtual machine that is infected by a worm. b. An IDS can detect a denial of service attack. False - Answers -True The reconnaissance phase of an attack occurs from outside of the network. True False - Answers -True What command should be used to recover VMM SQL data from a backup? a. SCVMM_rec.exe b. vmmrevert.exe c. SCVMMRecover.exe d. VMM_restore.ps1 - Answers -c. SCVMMRecover.exe What private IP address range is a Class B private IP range? a. 192.168.1.0 to 192.168.254.0 b. 172.16.0.0 to 172.31.0.0 c. 224.0.0.0 to 254.0.0.0 d. 10.0.0.0 to 10.255.255.0 - Answers -b. 172.16.0.0 to 172.31.0.0 Under what menu in the Virtual Machine Connection window can you send a "Ctrl+Alt+Delete" sequence to the guest OS? a. View b. File c. Action d. Edit - Answers -c. Action What port should not be assigned to any feature when installing VMM? a. 11245 b. 8631 c. 15892 d. 5986 - Answers -d. 5986 At what point is a Hyper-V host considered to be managed by a VMM instance? a. It is managed only after the server is joined to an Active Directory domain. b. It is managed once the VMM Management Server is installed. c. It is managed once the VMM Management Server is configured to handle all activity on the host. d. It is only managed by VMM after it has been successfully added via the VMM Console. - Answers -d. It is only managed by VMM after it has been successfully added via the VMM Console. Diskette drives are only available on generation one virtual machines. True False - Answers -True During the installation of VMM, you provided your administrative domain account to the installer as the service account. Now, operations are failing. What is the cause of the issue? a. The service account can't be an account managed by Active Directory, it must be a local account only. b. The service account must be a member of the Enterprise Administrators group in the domain. c. The service account is not meant to be an administrative account, for security reasons. d. The service account should not be the same account you are currently logged into while performing the install. - Answers -d. The service account should not be the same account you are currently logged into while performing the install. What sort of network policy should you utilize in vSphere if your intent is to limit the amount of bandwidth a virtual machine is allowed to use? a. network NIC teaming policy b. network flow policy c. network traffic shaping policy d. network security policy - Answers -c. network traffic shaping policy What virtualization product supports the use of 4-KB disk sectors within virtual drives, allowing the virtual machine to take advantage of increased storage capacity? a. XenWorks b. Microsoft Hyper-V c. Oracle VirtualBox d. VMware vSphere - Answers -b. Microsoft Hyper-V What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline? a. VMware vMotion b. VMware vCluster c. VMware AlwaysOn d. VMware FT - Answers -d. VMware FT A virtual machine that is paused on Hyper-V has a saved state, similar to a snapshot, that is reverted to when the virtual machine is resumed. True False - Answers -False You are assigning user roles to users within your Active Directory environment for use with VMM. What role should you assign a user that needs to manage self-service users as well as create and manage their own virtual machines? a. tenant administrator b. fabric administrator c. self service manager a. The guest OS will be assigned a random name. b. The guest OS will allow anonymous logins due to the use of a wildcard. c. The identity information will be copied from the host VMM and used to determine the UUID of the guest. d. The username associated with the guest OS profile is a wildcard, allowing any user to make use of the profile. - Answers -a. The guest OS will be assigned a random name. What happens when the "Delete" link is used from the Actions menu in Hyper-V Manager? a. The virtual machine configuration files are removed, but the virtual disk files are left in place. b. The virtual machine configuration files and virtual hard disks are deleted. c. The virtual machine configuration files are retained, but the virtual disk files are deleted. d. The virtual machine is removed from the list in Hyper-V manager, but both the configuration files and disk files remain intact. - Answers -a. The virtual machine configuration files are removed, but the virtual disk files are left in place. What statement regarding the installation requirements for Hyper-V is accurate? a. To install Hyper-V, you need a 32-bit or 64-bit version of Windows Server 2016. b. You must have a processor that supports SLAT in order to install Hyper-V. c. Hyper-V does not require the use of a processor with hardware virtualization. d. Hyper-V will not run on a processor with the DEP/NX bit feature. - Answers -b. You must have a processor that supports SLAT in order to install Hyper-V. You have enabled the "Data Exchange" feature within Integration Services for Hyper-V. What registry key is used to pass information back and forth between the guest and the host? a. HKEY_USERS\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters b. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Hyper-V\Guest\Parameters c. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters d. HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters - Answers -c. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Virtual Machine\Guest\ Parameters What two versions of the Microsoft .NET Framework must be installed in order for you to make use of VMM? a. .NET 4.0 and .NET 4.5 b. .NET 2.0 and .NET 3.0 c. .NET 3.5 and .NET 4.0 d. .NET 3.5 and .NET 4.6 - Answers -d. .NET 3.5 and .NET 4.6 The VMM Console has a built in restore function for recovering from backups. True False - Answers -False When connecting to a virtual machine through VMM Console, what is a valid option for interacting with the guest OS? a. Terminal Services Access (TSA) b. Virtual Network Computing (VNC) c. Remote Buffer Viewer (RBV) d. Remote Desktop (RDP) - Answers -d. Remote Desktop (RDP) When using a physical graphics card to accelerate video and 3D rendering in a virtual machine, what role must be added to the server? a. 3D Render Host role b. Terminal Services role c. Remote Desktop Virtualization role d. Virtualized Desktop Infrastructure role - Answers -c. Remote Desktop Virtualization role How do virtual COM ports communicate with the host machine on Hyper-V? a. COM ports communicate via special TCP/IP enabled network adapters on the guest and the host. b. The serial ports must utilize a special Microsoft USB driver that passes the traffic on the host's USB bus. c. Communication occurs through a setting in the Windows registry. d. Communication is done through the use of a named pipe. - Answers -d. Communication is done through the use of a named pipe. What is the recommended number of processor cores that should be available for the database server used by VMM? a. 16 cores b. 4 cores c. 8 cores d. 2 cores - Answers -a. 16 cores What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline? a. VMware AlwaysOn b. VMware FT c. VMware vMotion d. VMware vCluster - Answers -b. VMware FT A production type checkpoint within Hyper-V utilizes what service in the guest OS to perform the checkpoint? a. Integration Services Checkpoint for Windows b. Background Intelligent Transfer Service