Ciphers that perform symmetrical block encryption include which of the following? (Choose two.)
A. RC4
B. DSA
C. AES
D. RC5
Answer: RC4, ...
What security protocol uses multiple keys in a repetitive encryption process?
What security protocol uses multiple keys in a repetitive encryption process?
A. SSL/TLS
B. 3DES
C. RC5
D. RSA
Answer: 3DES (Triple Data Encryption...
Where are access control lists commonly configured? (Choose two.)
Where are access control lists commonly configured? (Choose two.)
A. Storage controllers
B. Routers
C. Load balancers
D. Servers
Answer: Storage...
What type of denial-of-service attack sends a large amount of Internet control packets to the target?
What type of denial-of-service attack sends a large amount of Internet control packets to the target?
A. DDoS
B. Ping of death
C. Ping flood
D. Obfuscation
Answer: Ping...
Which two encryption protocols use a public and private key pair for encryption?
Which two encryption protocols use a public and private key pair for encryption?
A. RC4
B. RSA
C. AES
D. DSA
Answer: RSA, AE...
User access control consists of which of the following? (Choose four.)
User access control consists of which of the following? (Choose four.)
A. Role-based administration
B. Discretionary
C. Multifactor
D. Guest accounts
E....
What is a standardized set of roles, policies, and procedures used to create, manage, distribute, use, store, and revoke digital certificates and manage public/private key encryption?
What is a standardized set of roles, policies, and procedures used to create, manage, distribute, use, store, and revoke digital certificates and manage...
What security technique is configured on a storage controller to limit what storage volumes a server can access?
What security technique is configured on a storage controller to limit what storage volumes a server can access?
A. Access control lists
B. LUN masking
C....
Name three types of role-based access control.
Name three types of role-based access control.
A. Zone masks
B. IPsec
C. Auditor
D. Admin
E. PKI
F. Guest
Answer: Auditor, Admin, Gues...
Hardening a server system can include which of the following? (Choose three.)
Hardening a server system can include which of the following? (Choose three.)
A. Installing security software
B. Installing service packs
C. Using...
What type of access control allows the users to assign rights to objects?
What type of access control allows the users to assign rights to objects?
A. Mandatory
B. Multifactor
C. Discretionary
D. Federation
Answer:&n...
What security protocol is used on web browsers for secure connection to an ecommerce site?
What security protocol is used on web browsers for secure connection to an ecommerce site?
A. AES
B. SSL/TLS
C. 3DES
D. DSA
Answer: SSL/TLS...
Which denial-of-service attack sends malformed ICMP packets to the target server?
Which denial-of-service attack sends malformed ICMP packets to the target server?
A. PKI
B. DDoS
C. Ping flood
D. Ping of death
Answer: Ping...
Network scanning will determine which of the following? (Choose three.)
Network scanning will determine which of the following? (Choose three.)
A. ACLs
B. TCP ports
C. IPsec
D. Active applications
E. Server vulnerabilities
Answer: TCP...
What is the name of a security site that authenticates the identity of individuals, computers, and other entities in the network?
What is the name of a security site that authenticates the identity of individuals, computers, and other entities in the network?
A. Registration...
What security technique is used in a storage area network to limit the storage systems a server can access?
What security technique is used in a storage area network to limit the storage systems a server can access?
A. Access control lists
B. LUN masking
C....
What is the process of complicating the ability to read stored data?
What is the process of complicating the ability to read stored data?
A. PKI
B. Obfuscation
C. Cipher
D. Symmetrical
Answer: Obfuscatio...
What uses a number of zombies or bots to create a denial-of-service attack?
What uses a number of zombies or bots to create a denial-of-service attack?
A. Ping of death
B. RCMP
C. DDoS
D. Ping flood
Answer: DDoS (Distributed...
Which security technique uses a list of permit and deny statements in a security device?
Which security technique uses a list of permit and deny statements in a security device?
A. Zoning
B. Masking
C. ACL
D. Authentication
Answer: ACL...
A _______ is any method of encrypting data by concealing its readability and meaning.
A _______ is any method of encrypting data by concealing its readability and meaning.
Answer: Ciphe...
_______ is an encryption framework that uses a pair of cryptographic keys: one public key and one private key.
_______ is an encryption framework that uses a pair of cryptographic keys: one public key and one private key.
Answer: Public Key Infrastructure...
_______ is the process of determining the identity of a client usually by a login process.
_______ is the process of determining the identity of a client usually by a login process.
Answer: Authenticatio...
LUN masking is configured on the _______ and controls access to logical storage units.
LUN masking is configured on the _______ and controls access to logical storage units.
Answer: Storage Controlle...
Zoning is configured on the _______ network to limit storage access between the initiator and the target.
Zoning is configured on the _______ network to limit storage access between the initiator and the target.
Answer: SA...
A _______ is an attack that is launched over the Internet from many end stations all attacking a target at the same time.
A _______ is an attack that is launched over the Internet from many end stations all attacking a target at the same time.
Answer: Distributed...
A _______ is a special security zone that contains servers that need to be accessed by the outside world via the Internet and also internally; it is a special network security zone that exposes cloud computers to the Internet.
A _______ is a special security zone that contains servers that need to be accessed by the outside world via the Internet and also internally; it is...
The device that is placed inline to network traffic and provides network security is a _______.
The device that is placed inline to network traffic and provides network security is a _______.
Answer: Firewal...
_______ is a system that can detect and mitigate a network attack as it is taking place.
_______ is a system that can detect and mitigate a network attack as it is taking place.
Answer: Intrusion Prevention System (IPS...
A _______ is used to create a secure connection over an insecure network.
A _______ is used to create a secure connection over an insecure network.
Answer: Virtual Private Network (VPN...
What is Path Traversal?
What is Path Traversal?
Answer: The software uses external input to construct a pathname that is intended to identify a file or directory that...
What is a Buffer Overflow?
What is a Buffer Overflow?
Answer: The program copies an input buffer to an output buffer without verifying that the size of the input buffer...
What is an Open Redirect?
What is an Open Redirect?
Answer: A web application accepts a user-controlled input that specifies a link to an external site, and uses that...
What is Cross-Site Request Forgery (CSRF)?
What is Cross-Site Request Forgery (CSRF)?
Answer: The web application does not, or cannot, sufficiently verify whether a well-formed, valid,...
What is Unrestricted File Upload?
What is Unrestricted File Upload?
Answer: The software allows the attacker to upload or transfer files of dangerous types that can be automatically...
What is Cross-Site Scripting (XSS)?
What is Cross-Site Scripting (XSS)?
Answer: The software does not neutralize or incorrectly neutralizes user-controllable input before it is...
What is OS Command Injection and how can it be mitigated?
What is OS Command Injection and how can it be mitigated?
Answer: The software constructs all or part of an OS command using externally-influenced...
What is SQL Injection?
What is SQL Injection?
Answer: The software constructs all or part of an SQL command using externally-influenced input from an upstream component,...
What are the three software categories for SANS Top 25?
What are the three software categories for SANS Top 25?
Answer: Insecure Interaction between Components (6), Risky Resource Management (8), and...
The identity management process of allowing users in different security domains to share services without having identities in each domain is called what?
The identity management process of allowing users in different security domains to share services without having identities in each domain is called...
Which of the following is not a legal risk associated with cloud computing?
Which of the following is not a legal risk associated with cloud computing?
A. Data isolation
B. Jurisdiction
C. Cost
D. Electronic discovery
...
True or false? The United States and the European Union have compatible data privacy laws.
True or false? The United States and the European Union have compatible data privacy laws.
Answer: Fals...
Authentication to multiple services in the cloud can be streamlined by adopting which of the following identity management mechanisms?
Authentication to multiple services in the cloud can be streamlined by adopting which of the following identity management mechanisms?
A. Kerberos
B....
Which of the following actions would not lead to risks related to records retention in the cloud?
Which of the following actions would not lead to risks related to records retention in the cloud?
A. Secure destruction of records on schedule
B. Restrictions...
True or false? Government agencies must always notify a data owner when they compel disclosure of information from a cloud service provider as part of lawful access.
True or false? Government agencies must always notify a data owner when they compel disclosure of information from a cloud service provider as part...
An organization can address regulatory compliance risks in the cloud in all the following ways except which one?
An organization can address regulatory compliance risks in the cloud in all the following ways except which one?
A. Its own security policies
B. Periodic...
True or false? Dynamic scaling of resources in the cloud may lead to noncompliance with software licenses.
True or false? Dynamic scaling of resources in the cloud may lead to noncompliance with software licenses.
Answer: Tru...
Which countries could claim jurisdiction over data in the cloud?
Which countries could claim jurisdiction over data in the cloud?
A. The country in which physical servers storing data reside
B. The countries that...
What is the process of verifying a user's identity?
What is the process of verifying a user's identity?
A. Authorization
B. Authentication
C. Logging In
D. Access Control
Answer: Authentica...
What is the process used to relieve network operations from repetitive tasks?
What is the process used to relieve network operations from repetitive tasks?
A. Hypervisor management utilities
B. Automation
C. Dashboard
D. IP...
Problems with your deployment can be determined and resolved by using which of the following?
Problems with your deployment can be determined and resolved by using which of the following?
A. Pooling
B. Affinity
C. Resource monitoring
D. Hypervisor...
Which SNMP version supports secure authentication and encryption?
Which SNMP version supports secure authentication and encryption?
A. 1
B. 2
C. 2c
D. 3
Answer: ...
Which SNMP version added 64-bit counters?
Which SNMP version added 64-bit counters?
A. 1
B. 2
C. 2c
D. 3
Answer: 2...
Physical resource redirection includes the mapping of what three devices?
Physical resource redirection includes the mapping of what three devices?
A. Parallel port
B. Redundant power supplies
C. Serial port
D. USB port
E....
What is the ability to assign a processing thread to a core instead of having the hypervisor dynamically allocate it?
What is the ability to assign a processing thread to a core instead of having the hypervisor dynamically allocate it?
A. Priority threading
B. QOS...
What are three standards-based protocols used for remote management and configuration?
What are three standards-based protocols used for remote management and configuration?
A. SNMP
B. RDP
C. SSH
D. HTTP
E. ILO
Answer: SNMP, SSH,...
What interface is used as a command-line interface using a serial port?
What interface is used as a command-line interface using a serial port?
A. Console port
B. Telnet
C. USB port
D. Serial Line Interface Protocol
Answer: Console...
What is a proprietary protocol developed by Microsoft to allow remote access to Windows operating systems?
What is a proprietary protocol developed by Microsoft to allow remote access to Windows operating systems?
A. SNMP
B. RDP
C. SSH
D. IPMI
Answer: Remote...
What is the ability to assign resources from pools to VMs as demand requires known as?
What is the ability to assign resources from pools to VMs as demand requires known as?
A. Reservations
B. Dynamic resource allocation
C. Affinity
D....
What is a secure communications protocol used for remote command-line access to a device?
What is a secure communications protocol used for remote command-line access to a device?
A. IPSec
B. Telnet
C. SNMP
D. SSH
E. RDP
Answer: Secure...
The hypervisor will pool multicore CPUs into what to be used by the VMs?
The hypervisor will pool multicore CPUs into what to be used by the VMs?
A. CPU affinity
B. Multithreading
C. vCPU
D. Multisockets
Answer: ...
What is the usage fee for the right to use an application called?
What is the usage fee for the right to use an application called?
A. EULA
B. Licensing
C. Pooling
D. SNMP
Answer: Licensin...
Since there is a finite supply of server resources and there are many virtual machines that can consume these resources, it becomes very important that what TWO things be assigned to prevent a few VMs from monopolizing all the available resources?
Since there is a finite supply of server resources and there are many virtual machines that can consume these resources, it becomes very important that...
What four components do the physical resources on a bare-metal server contain?
What four components do the physical resources on a bare-metal server contain?
A. Storage
B. Memory
C. Cooling systems
D. Load balancers
E. CPU
F....
What are predefined threshold values that are exceeded called?
What are predefined threshold values that are exceeded called?
A. Delta value
B. Trap
C. Variance
D. Deviation pool
Answer: Varianc...
A network management station can send alerts using which two methods?
A network management station can send alerts using which two methods?
A. SNMP
B. Trap
C. Email
D. SMS
Answer: Email, SM...
Which management protocol can be used to remotely access a server to power it on and make BIOS changes?
Which management protocol can be used to remotely access a server to power it on and make BIOS changes?
A. WMI
B. IPMI
C. RDP
D. SSH
Answer: Intelligent...
The SNMP protocol uses which two functions as its primary method of communications with a remote managed device?
The SNMP protocol uses which two functions as its primary method of communications with a remote managed device?
A. Get
B. Trap
C. OID
D. Set
Answer: Get,...
What does SNMP use to send an unsolicited datagram to the management station to alert it of a critical event?
What does SNMP use to send an unsolicited datagram to the management station to alert it of a critical event?
A. OID
B. Set
C. Alert
D. Trap
An...
The _______ protocol is commonly used to connect to a management GUI to configure a remote device using a standard browser.
The _______ protocol is commonly used to connect to a management GUI to configure a remote device using a standard browser.
Answer: HTT...
A value that is considered out of range from your baseline measurements is referred to as a _______.
A value that is considered out of range from your baseline measurements is referred to as a _______.
Answer: Varianc...
The _______ define what is provided from the software company and what you are allowed to do with that software.
The _______ define what is provided from the software company and what you are allowed to do with that software.
Answer: End-User License Agreement...
Cloud _______ or _______ applications have highly tuned algorithms to dynamically monitor and add resources as needed to prevent resource starvation or VM performance issues.
Cloud _______ or _______ applications have highly tuned algorithms to dynamically monitor and add resources as needed to prevent resource starvation...
A _______ is based on a pool of resources available for use by the virtual machines and defines the ceiling or the upper limit of what the cloud provider will deliver.
A _______ is based on a pool of resources available for use by the virtual machines and defines the ceiling or the upper limit of what the cloud provider...
Various classes or tiers of service—such as basic, advanced, and premium services based on quotas and levels of compute services offered per tier by the cloud provider—are called _______.
Various classes or tiers of service—such as basic, advanced, and premium services based on quotas and levels of compute services offered per tier by...
Tracking CPU usage statistics over a period of time is an example of establishing a _______.
Tracking CPU usage statistics over a period of time is an example of establishing a _______.
Answer: Baselin...
The _______ protocol developed by Microsoft is used to query a remote Windows device to gather information and make configuration changes.
The _______ protocol developed by Microsoft is used to query a remote Windows device to gather information and make configuration changes.
Answer: Windows...
The _______ protocol is used by devices to send logging information to a remote collection server.
The _______ protocol is used by devices to send logging information to a remote collection server.
Answer: Syslo...
The vendor of the managed device will publish a _______ that is loaded onto the network management system and defines what objects can be accessed on the monitored equipment and where they are located on the device.
The vendor of the managed device will publish a _______ that is loaded onto the network management system and defines what objects can be accessed on...
A disaster recovery site that is offline except for critical data storage such as a database is a ___.
A disaster recovery site that is offline except for critical data storage such as a database is a ___.
A. Hot site
B. Site mirroring
C. Warm site
D....
Which data replication process occurs in real time?
Which data replication process occurs in real time?
A. Asynchronous replication
B. Archiving
C. Synchronous replication
D. Site mirroring
Answer: Synchronous...
What is the process of returning operations to your primary datacenter after service has been restored?
What is the process of returning operations to your primary datacenter after service has been restored?
A. Multipathing
B. High availability
C. Failover
D....
What is the transfer and synchronization of data between multiple datacenters called?
What is the transfer and synchronization of data between multiple datacenters called?
A. High availability
B. Archiving
C. Replication
D. Site mi...
What is the expected time metric to recover from a service interruption?
What is the expected time metric to recover from a service interruption?
A. RTO
B. SNMP
C. MTBF
D. MTTR
E. RPO
Answer: Restore Time Objective...
Which disaster recover model provides a remote facility that requires equipment to be installed and configured as part to the recovery process?
Which disaster recover model provides a remote facility that requires equipment to be installed and configured as part to the recovery process?
A....
What refers to the ability of a service to remain online in the event of a failure in the system?
What refers to the ability of a service to remain online in the event of a failure in the system?
A. Replication
B. Load balancing
C. Fault tolerance
D....
What are three examples of multipath technologies?
What are three examples of multipath technologies?
A. TRILL
B. High availability
C. SAN_A/SAN_B
D. Spanning tree
E. Link aggregation
Answer: TRILL,...
What is the process of keeping the backup site updated so it is ready to assume the workload in the event of a primary datacenter failure?
What is the process of keeping the backup site updated so it is ready to assume the workload in the event of a primary datacenter failure?
A. High...
What is the average repair time of a component referred to?
What is the average repair time of a component referred to?
A. RTO
B. SNMP
C. MTBF
D. MTTR
E. RPO
Answer: Mean Time to Repair (MTTR...
A group of servers interconnected and sharing processing and redundancy in a single datacenter is referred to as what?
A group of servers interconnected and sharing processing and redundancy in a single datacenter is referred to as what?
A. Redundancy
B. Cluster
C....
What is it called when two devices are interconnected in an active/standby or active/active configuration that allows for very fast recovery from a failure?
What is it called when two devices are interconnected in an active/standby or active/active configuration that allows for very fast recovery from a...
What technology allows for horizontal scaling of computing resources?
What technology allows for horizontal scaling of computing resources?
A. Replication
B. Load balancing
C. MTTR
D. High availability
Answer: Load...
Which data replication process is scheduled?
Which data replication process is scheduled?
A. Asynchronous replication
B. Archiving
C. Synchronous replication
D. Site mirroring
Answer: Asynchronous...
A disaster recovery architecture in which a standby datacenter has current data and can take over for the primary in near real time is known as?
A disaster recovery architecture in which a standby datacenter has current data and can take over for the primary in near real time is known as?
A....
What is it called when you disperse the cloud deployment to multiple dispersed cloud hosting datacenters so that if one facility experiences a disruption your cloud services will remain accessible in other locations?
What is it called when you disperse the cloud deployment to multiple dispersed cloud hosting datacenters so that if one facility experiences a disruption...
A server that has a power supply failure but remains operational has what kind of systems?
A server that has a power supply failure but remains operational has what kind of systems?
A. Failback
B. Redundant
C. High availability
D. Local...
What is the data recovery point when recovering operations from an outage?
What is the data recovery point when recovering operations from an outage?
A. RTO
B. ITIL
C. MTBF
D. MTTR
E. RPO
Answer: Recovery Point Objective...
What is the expected lifetime of a component referred to as?
What is the expected lifetime of a component referred to as?
A. RTO
B. SNMP
C. MTBF
D. STP
Answer: Mean Time Between Failures (MTBF...
What is the process of transferring operations to a backup system in the event that the primary fails?
What is the process of transferring operations to a backup system in the event that the primary fails?
A. Multipathing
B. High availability
C. Failover
D....
______ lowers the possibility of failures by designing backup systems into the cloud architecture.
______ lowers the possibility of failures by designing backup systems into the cloud architecture.
Answer: Redundanc...
The ______ is the amount of data that may be lost when restarting the operations.
The ______ is the amount of data that may be lost when restarting the operations.
Answer: Recovery Point Objectiv...
The cloud operations can be deployed in a ______ model where two fully redundant cloud data centers are active at the same time. Each cloud datacenter will back up the other in the event of a failure.
The cloud operations can be deployed in a ______ model where two fully redundant cloud data centers are active at the same time. Each cloud datacenter...
With ______, the data is first written to the primary storage system in the primary storage facility or cloud location. After the data is stored, it is then copied to remote replicas on a scheduled basis or at near real time.
With ______, the data is first written to the primary storage system in the primary storage facility or cloud location. After the data is stored, it...
The ______ model is where the servers and infrastructure are not installed or operational until needed.
The ______ model is where the servers and infrastructure are not installed or operational until needed.
Answer: Cold Sit...
The ______ is the expected amount of time a device will function before it fails.
The ______ is the expected amount of time a device will function before it fails.
Answer: Mean Time Between Failures (MTBF...
Using ______ designs, two devices can be interconnected in an active/standby or active/active configuration that allows for very fast recovery from a failure.
Using ______ designs, two devices can be interconnected in an active/standby or active/active configuration that allows for very fast recovery from...
The ___ is the time it takes to get a service bank online and available after a failure.
The ___ is the time it takes to get a service bank online and available after a failure.
Answer: Recovery Time Objective (RTO...
A backup cloud facility that hosts an operational database server that is in sync with the database server at the primary datacenter with the rest of the infrastructure not online is referred to as a ___
A backup cloud facility that hosts an operational database server that is in sync with the database server at the primary datacenter with the rest of...
___-___ is content distributed around the globe for proximity and redundancy.
___-___ is content distributed around the globe for proximity and redundancy.
Answer: Geo-diversit...
Which of the following risks leads to an increased cost for running a cloud-based application?
Which of the following risks leads to an increased cost for running a cloud-based application?
A. Security Compliance
B. IT Organizational Changes
C....
True or false? Big data applications are perfect candidates for cloud-based applications.
True or false? Big data applications are perfect candidates for cloud-based applications.
Answer: Fals...
Which of the following is not a risk associated with cloud-based applications?
Which of the following is not a risk associated with cloud-based applications?
A. Vendor Lock-In
B. Reliability
C. Security
D. Lack of Development...
Which of the following is an advantage of migrating an application to an IaaS provider?
Which of the following is an advantage of migrating an application to an IaaS provider?
A. No operating system maintenance
B. Lower cost than PaaS
C....
What type of application design is preferable for a cloud-based application?
What type of application design is preferable for a cloud-based application?
A. A design that uses stateful objects
B. A design that uses stateless...
Which of the following is a design pattern of cloud-based applications?
Which of the following is a design pattern of cloud-based applications?
A. Predictable volume
B. Constant processing
C. Unpredictable burst
D. Big...
What are the main advantages of using a web-based distributed application?
What are the main advantages of using a web-based distributed application? (Choose two.)
A. Availability
B. Scalability
C. Security
D. Reliability
Answer: Availability,...
True or false? All distributed applications are web applications.
True or false? All distributed applications are web applications.
Answer: Fals...
What is the main limitation of a desktop application?
What is the main limitation of a desktop application?
A. Lack of manageability
B. Lack of reliability
C. Lack of security
D. Lack of scalability
Answer: Lack...
What are the three basic logical tiers of a distributed application?
What are the three basic logical tiers of a distributed application? (Choose three.)
A. Presentation
B. Application
C. Network
D. Data
E. Internet
Answer: Presentation,...
The concept of creating a group of storage, memory, processing, and I/O for other types of resources and sharing them in a virtualized cloud is called ___.
The concept of creating a group of storage, memory, processing, and I/O for other types of resources and sharing them in a virtualized cloud is called...
When migrating from your local datacenter to a cloud network, it is sometimes necessary to copy an image of the server and send it to the cloud provider in a physical media for installation. This is known as a(n) ___ migration.
When migrating from your local datacenter to a cloud network, it is sometimes necessary to copy an image of the server and send it to the cloud provider...
To isolate storage networks over the same SAN fabric, we create ___.
To isolate storage networks over the same SAN fabric, we create ___.
Answer: Virtual Storage Area Network (VSAN...
When we perform a(n) ___, we are making complete copies of hard drive volumes.
When we perform a(n) ___, we are making complete copies of hard drive volumes.
Answer: Image Backu...
Storage space that is presented to the guest virtual machine as an actual hard drive is called a(n) ___
Storage space that is presented to the guest virtual machine as an actual hard drive is called a(n) ___
Answer: Virtual Dis...
The process of storing and backing up folders and files with backup applications for later access if needed is referred to as ___.
The process of storing and backing up folders and files with backup applications for later access if needed is referred to as ___.
Answer: File-level...
Creating a master virtual machine image to be used to create a separate and independent virtual machine is referred to as ___.
Creating a master virtual machine image to be used to create a separate and independent virtual machine is referred to as ___.
Answer: Cloni...
A ___ is a file-based image of the current state of a virtual machine.
A ___ is a file-based image of the current state of a virtual machine.
Answer: Snapsho...
Hypervisors that are available for free on sites like sourceforge.net are known as ___ software.
Hypervisors that are available for free on sites like sourceforge.net are known as ___ software.
Answer: Open Sourc...
When we take a single server and install ____ software on the bare metal, we can run multiple operating systems on the same piece of hardware.
When we take a single server and install ____ software on the bare metal, we can run multiple operating systems on the same piece of hardware.
An...
The process of converting a server running on bare-metal server hardware in a corporate datacenter to a hypervisor in the cloud is referred to as what?
The process of converting a server running on bare-metal server hardware in a corporate datacenter to a hypervisor in the cloud is referred to as what?
A....
The ability to dynamically commit and reclaim resources such as storage, memory, and CPU is referred to as what?
The ability to dynamically commit and reclaim resources such as storage, memory, and CPU is referred to as what?
A. Elasticity
B. Resource pooling
C....
The process of converting a virtual machine running in a corporate datacenter to a hypervisor in the cloud is often referred to as what?
The process of converting a virtual machine running in a corporate datacenter to a hypervisor in the cloud is often referred to as what?
A. V2V
B....
When you are migrating from a physical to a virtual server, what are three external parameters that may need to be changed?
When you are migrating from a physical to a virtual server, what are three external parameters that may need to be changed?
A. IP addressing
B. DNS...
The process of converting a server running on a hypervisor to bare metal is called what?
The process of converting a server running on a hypervisor to bare metal is called what?
A. V2V
B. P2V
C. V2P
D. Offline migration
Answer: ...
A real-time migration from the corporate datacenter to the cloud of virtual machines is referred to as what?
A real-time migration from the corporate datacenter to the cloud of virtual machines is referred to as what?
A. V2V
B. Transposing
C. Online migration
D....
When you are performing online storage migration to the cloud, what must you take into consideration?
When you are performing online storage migration to the cloud, what must you take into consideration?
A. Applications to restore
B. WAN bandwidth
C....
What type of migration includes cloning an existing virtual machine and installing it on a cloud provider's hypervisor?
What type of migration includes cloning an existing virtual machine and installing it on a cloud provider's hypervisor?
A. Type 1
B. Type 2
C. V2V
D....
When creating a server baseline when planning a migration, you should collect and analyze which three important parameters?
When creating a server baseline when planning a migration, you should collect and analyze which three important parameters?
A. CPU utilization
B....
What LAN technology is used to logically segment an Ethernet network?
What LAN technology is used to logically segment an Ethernet network?
A. VSAN
B. vNIC
C. VLAN
D. Virtual switch
Answer: VLA...
A virtual machine does not have a hardware LAN card installed. What does it use instead?
A virtual machine does not have a hardware LAN card installed. What does it use instead?
A. VLAN
B. Virtual switch
C. vNIC
D. Host bus adapter
Answer: vNIC...
What type of storage is presented to the virtual machine as an actual hard drive?
What type of storage is presented to the virtual machine as an actual hard drive?
A. Volume
B. File storage
C. Ghosting
D. Virtual disk
Answer: Virtual...
What is the name for a piece of software running in a hypervisor that acts as a network interconnection for the virtual machines to the outside network?
What is the name for a piece of software running in a hypervisor that acts as a network interconnection for the virtual machines to the outside network?
A....
A virtual server image created in a certain specific moment in time is called a what?
A virtual server image created in a certain specific moment in time is called a what?
A. Cloning
B. Virtual disk backup
C. Snapshot
D. Replica
...
When creating a virtual machine image, what are three of the common components that are included in the master image?
When creating a virtual machine image, what are three of the common components that are included in the master image?
A. Operating system
B. Service...
When cloning a server to use as a reference in creating a new virtual machine, which two attributes must be changed?
When cloning a server to use as a reference in creating a new virtual machine, which two attributes must be changed?
A. UUID
B. BIOS
C. SAN name
D....
What are two examples of open-source hypervisors?
What are two examples of open-source hypervisors?
A. ESXi
B. VirtualBox
C. KVM
D. Hyper-V
Answer: Virtualbox and KV...
What is the type of hypervisor that runs on top of an already installed operating system is?
What is the type of hypervisor that runs on top of an already installed operating system is?
A. Virtualized
B. Cloud
C. Type 1
D. Type 2
Answer: Type...
What is the type of hypervisor that runs directly on top of the bare-metal server (hardware).
What is the type of hypervisor that runs directly on top of the bare-metal server (hardware).
A. Virtualized
B. Cloud
C. Type 1
D. Type 2
Answer: Type...
What is the name given to the type of software that enables a server to be logically abstracted and appear to the operating system running on it as if it is running directly on the server hardware itself?
What is the name given to the type of software that enables a server to be logically abstracted and appear to the operating system running on it as...
Subscribe to:
Posts (Atom)