Which of the following is not a benefit of standardization?Consistent managementBetter control of system accessUniform logging across systemsFlexible...
Which strategy uses a structured, centralized approach to applying IT modifications?
Which strategy uses a structured, centralized approach to applying IT modifications?Load testingPenetration testingChange managementWorkflow testingAnswer: Change...
After a development team solves bugs within a web application, what should it do next?
After a development team solves bugs within a web application, what should it do next?Deploy patches.Back up the virtual machine.Create a virtual machine...
Which of the following is a storage component containing firmware that should be updated in an iSCSI environment?
Which of the following is a storage component containing firmware that should be updated in an iSCSI environment?Network switchRouterHBAVLANAnswer:&n...
Which type of patch addresses a single small issue?
Which type of patch addresses a single small issue?Service packHotfixUpdate dependencyRolling updateAnswer: Hot...
An existing cloud virtual machine does not have the computing power to properly serve an application. What should you do?
An existing cloud virtual machine does not have the computing power to properly serve an application. What should you do?Scale out.Resize the virtual...
Before determining that performance levels are out of the norm, what is required?
Before determining that performance levels are out of the norm, what is required?BaselineKey performance indicatorService level agreementConfiguration...
Which strategy ensures adequate resources are available for future service provisioning?
Which strategy ensures adequate resources are available for future service provisioning?Storage provisioningRapid elasticityThin provisioningCapacity...
What is required in order to ensure an effective failover cluster?
What is required in order to ensure an effective failover cluster?Shared storagePublic IP addressPrivate IP addressHypervisorsAnswer: Shared sto...
Which software development methodology has continuous software improvements being developed?
Which software development methodology has continuous software improvements being developed?Rolling updatesContinuous updatesRolling deploymentContinuous...
Which phrase refers to the average amount of time before potential hard disk failures?
Which phrase refers to the average amount of time before potential hard disk failures?MTTRMTBFRTORPOAnswer: M...
Which of the following can help technicians identify cloud performance issues?
Which of the following can help technicians identify cloud performance issues?Service level agreementFirewall settingsAdditional virtual CPUsKey performance...
Which ITIL phase is related to support documentation such as service level agreements?
Which ITIL phase is related to support documentation such as service level agreements?Service strategyService designService transitionService operationAnswer: Service...
______ is an organizational documentation that ensures tasks are performed consistently.
______ is an organizational documentation that ensures tasks are performed consistently.Standard operating procedureService level agreementWorkflowNetwork...
Which landscape is used for testing small changes made to code immediately after development?
Which landscape is used for testing small changes made to code immediately after development?DevelopmentQuality assuranceTestingProductionAnswer: Small...
Which of the following is not a method for deploying application updates?
Which of the following is not a method for deploying application updates?Manual version updatingEnd-user updatingUsing DevOps ticketingUsing a package...
Donna has been developing software for her company. She makes a copy of the directory where her code is stored each time she makes a significant change. However, the project she started years ago is now much larger and there are two other developers who also work on the program with her. She would like a way to better manage the code so that she can revert to previous states if necessary and track changes made by each person. Which technology would you suggest?
Donna has been developing software for her company. She makes a copy of the directory where her code is stored each time she makes a significant change....
Which of the following is not a benefit of standardization?
Which of the following is not a benefit of standardization?Consistent managementBetter control of system accessUniform logging across systemsFlexible...
When should maintenance windows be scheduled?
When should maintenance windows be scheduled?In the morningIn the eveningOn weekendsWhen they will least impact customersAnswer: A maintenance window...
Carlos works in the IT department at Sample Bank. He uses a cloud-based e-mail system and has been asked by his manager to establish metrics on mailbox usage per department so that department budgets can be billed for the expense of hosting department e-mail. What is this practice known as?
Carlos works in the IT department at Sample Bank. He uses a cloud-based e-mail system and has been asked by his manager to establish metrics on mailbox...
Capacity management has responsibility for ensuring that the capacity of the IT service is optimally matched to what?
Capacity management has responsibility for ensuring that the capacity of the IT service is optimally matched to what?DemandFuture trendsProceduresAvailabilityAnswer: Capacity...
Which of the following defines the rule sets by which users and administrators must abide?
Which of the following defines the rule sets by which users and administrators must abide?ProceduresChange managementPoliciesTrendingAnswer: Policies...
Which of these options is not a valid mechanism for improving disk performance?
Which of these options is not a valid mechanism for improving disk performance?A. Replacing rotational media with solid state mediaB. Replacing rotational...
Which tool allows guest operating systems to share noncritical memory pages with the host?
Which tool allows guest operating systems to share noncritical memory pages with the host?A. CPU affinityB. Memory ballooningC. Swap file configurationD....
You need to divide your virtualized environment into groups that can be managed by separate groups of administrators. Which of these tools can you use?
You need to divide your virtualized environment into groups that can be managed by separate groups of administrators. Which of these tools can you use?A....
What do you need to employ if you have a serial device that needs to be utilized by a virtual machine?
What do you need to employ if you have a serial device that needs to be utilized by a virtual machine?A. Network isolationB. Physical resource redirectionC....
Which of the following must be licensed when running a virtualized infrastructure?
Which of the following must be licensed when running a virtualized infrastructure?A. HostsB. Virtual machinesC. BothD. NeitherAnswer: C. Both hosts...
In a scenario where an entity exceeds its defined quota but is granted access to the resources anyway, what must be in place?
In a scenario where an entity exceeds its defined quota but is granted access to the resources anyway, what must be in place?A. PenaltyB. Hard quotaC....
What mechanism allows one core to handle all requests from a specific thread on a specific processor core?
What mechanism allows one core to handle all requests from a specific thread on a specific processor core?A. V2VB. CPU affinityC. V2PD. P2VAnswer: B....
How does the hypervisor enable access for virtual machines to the physical hardware resources on a host?
How does the hypervisor enable access for virtual machines to the physical hardware resources on a host?A. Over Ethernet cablesB. By using USB 3.0C. Through...
When would a reservation be used?
When would a reservation be used?A. When a maximum amount of resources needs to be allocated to a specific resourceB. When a minimum amount of capacity...
How are quotas defined?
How are quotas defined?A. By management systemsB. According to service level agreements that are defined between providers and their customersC. Through...
Quotas are a mechanism for enforcing what?
Quotas are a mechanism for enforcing what?A. LimitsB. RulesC. Access restrictionsD. VirtualizationAnswer: A. Quotas are limits on the resources that...
Which of the following would be considered a host compute resource?
Which of the following would be considered a host compute resource?A. CoresB. Power supplyC. ProcessorD. BandwidthAnswer: C. The four compute resources...
An existing on-premises application will no longer be used in your company's public cloud implementation. Instead, a functional cloud equivalent will be used. To which aspect of the application life cycle does this apply?
An existing on-premises application will no longer be used in your company's public cloud implementation. Instead, a functional cloud equivalent will...
Andrew is working in a server room and needs to connect his laptop directly to a hypervisor for management purposes. What should he plug his laptop into?
Andrew is working in a server room and needs to connect his laptop directly to a hypervisor for management purposes. What should he plug his laptop into?A....
At which application life cycle phase is software performance tweaked?
At which application life cycle phase is software performance tweaked?A. DeploymentB. SpecificationsC. TestingD. MaintenanceAnswer: D. Maintena...
At which application life cycle phase are breakpoints removed by developers?
At which application life cycle phase are breakpoints removed by developers?A. DeploymentB. SpecificationsC. UpgradesD. TestingE. MaintenanceAnswer: A....
Which of the following is an example of application life cycle management models?
Which of the following is an example of application life cycle management models?A. WBEMB. ITLIC. MOFD. OSIAnswer: C. ...
Which key is used to encrypt an SSH session?
Which key is used to encrypt an SSH session?A. PublicB. PrivateC. SymmetricD. AsymmetricAnswer: C. Symmet...
Which e-mail transfer protocol is commonly used to send notifications?
Which e-mail transfer protocol is commonly used to send notifications?A. POP3B. SNMPC. IMAPD. SMTPE. SyslogAnswer: D. S...
What systems do cloud providers implement for rapid deployment of customer-requested services?
What systems do cloud providers implement for rapid deployment of customer-requested services?A. RDMSB. OrchestrationC. On-demand provisionsD. ScriptingAnswer: B....
You need to determine if future cloud network performance values are acceptable. What should you do first?
You need to determine if future cloud network performance values are acceptable. What should you do first?A. Enable syslog forwarding.B. Forward logs...
You are using IPMI to remotely monitor a host whose operating system has crashed and is unresponsive. What type of items would you be monitoring?
You are using IPMI to remotely monitor a host whose operating system has crashed and is unresponsive. What type of items would you be monitoring?A. Running...
Which protocol does Microsoft System Center Configuration Manager (SCCM) use to gather hardware inventory?
Which protocol does Microsoft System Center Configuration Manager (SCCM) use to gather hardware inventory?A. WMIB. SyslogC. WBEMD. IPMIE. SNMPAnswer: A....
A national tax preparation firm tracks internal IT resource usage by department for billing purposes. What type of cloud is this?
A national tax preparation firm tracks internal IT resource usage by department for billing purposes. What type of cloud is this?A. MeteredB. PrivateC....
What is the desired end result of ITIL?
What is the desired end result of ITIL?A. CABB. Continual service improvementC. Service strategyD. Service operationAnswer: B. The end result of...
Which of the following terms best describes life cycle management?
Which of the following terms best describes life cycle management?A. BaselineB. FiniteC. LinearD. ContinuumAnswer: D. Life cycle management is a...
Which of the following is a benefit of remote hypervisor administration?
Which of the following is a benefit of remote hypervisor administration?A. Only being able to modify one hypervisor host at a timeB. Being able to remotely...
Which of the following would be used to directly connect to a hypervisor host remotely to modify operating system settings on the hypervisor host?
Which of the following would be used to directly connect to a hypervisor host remotely to modify operating system settings on the hypervisor host?A. RDPB....
You have been tasked with gathering a list of software installed on all the computers in your environment. You want to gather this information remotely. Which of the following would you use to gather this information?
You have been tasked with gathering a list of software installed on all the computers in your environment. You want to gather this information remotely....
Which of the following would you use to remotely access a virtualization host in a secure fashion?
Which of the following would you use to remotely access a virtualization host in a secure fashion?A. TelnetB. PingC. HTTPSD. Console portAnswer: C....
You receive an alert that a virtual machine is down. The server does not respond to a ping. What tool should you use to troubleshoot the server if you are off-site?
You receive an alert that a virtual machine is down. The server does not respond to a ping. What tool should you use to troubleshoot the server if you...
Which of the following allows for out-of-band management of a computer?
Which of the following allows for out-of-band management of a computer?A. WMIB. SMSC. SNMPD. IPMI Remote-Access ToolsAnswer: D. The Intelligent Platform...
Which of the following alerting methods can be configured to send an e-mail when a certain alert is triggered?
Which of the following alerting methods can be configured to send an e-mail when a certain alert is triggered?A. SMTPB. SMSC. SNMPD. SyslogAnswer: A....
Which of the following alerting methods allows a technician to receive an alert on a mobile device such as a cell phone?
Which of the following alerting methods allows a technician to receive an alert on a mobile device such as a cell phone?A. SMTPB. SMSC. SNMPD. SyslogAnswer: B....
Which of the following constantly executes a software component called an agent, which reports information using the protocol back to a manager?
Which of the following constantly executes a software component called an agent, which reports information using the protocol back to a manager?A. WMIB....
Which of the following can be used to create scripts that can be run against target computers to perform simple administrative tasks?
Which of the following can be used to create scripts that can be run against target computers to perform simple administrative tasks?A. WMIB. SMTPC. SMSD....
Which of the following utilizes UDP port 514 when collecting events?
Which of the following utilizes UDP port 514 when collecting events?A. SNMPB. SyslogC. WMID. We servicesAnswer: B. Syslog provides a mechanism for...
Which of these can be used by both a cloud consumer and a cloud provider to give a visual picture of performance metrics?
Which of these can be used by both a cloud consumer and a cloud provider to give a visual picture of performance metrics?A. APIB. SNMPC. DashboardD. SMTPAnswer: C....
Which of the following can be used to identify which operating system version is installed on a virtual machine?
Which of the following can be used to identify which operating system version is installed on a virtual machine?A. WMIB. SMTPC. SMSD. IMAPAnswer: A....
Which of the following is NOT a benefit of using VLANs?
Which of the following is NOT a benefit of using VLANs?A. PerformanceB. Reduced costsC. SecurityD. Reduced network complexityAnswer: D. Reduced network...
What increases as compression reduces the size of transmitted data?
What increases as compression reduces the size of transmitted data?A. Routing complexityB. Available bandwidthC. Cloud ingress network traffic costsD....
Your organization plans to use iSCSI for shared network storage. Which technique should be used to ensure that iSCSI traffic is kept separate from other IP traffic?
Your organization plans to use iSCSI for shared network storage. Which technique should be used to ensure that iSCSI traffic is kept separate from other...
Users complain that Internet access has been intermittent. You check the configuration of a user system and discover it has an IP address beginning with 169.254. What is the problem?
Users complain that Internet access has been intermittent. You check the configuration of a user system and discover it has an IP address beginning with...
Andrew is a cloud network administrator. Cloud-based virtual machines hosting a custom web application have been deployed to a single cloud virtual network that currently has no Internet access. Each virtual machine must have Internet access, while incoming connections initiated from the Internet must be blocked. Which solution should the administrator deploy?
Andrew is a cloud network administrator. Cloud-based virtual machines hosting a custom web application have been deployed to a single cloud virtual network...
Lisa is responsible for a web application running in the public cloud. Recent performance metrics indicate that the average user wait time for page loads is four seconds due to the high number of HTTP requests. What should she configure?
Lisa is responsible for a web application running in the public cloud. Recent performance metrics indicate that the average user wait time for page loads...
A client web browser connects to an HTTPS web server. Which port does the server use to communicate back to the client?
A client web browser connects to an HTTPS web server. Which port does the server use to communicate back to the client?A. 81B. 444C. Any port below 1024D....
Which of the following is a disadvantage of network compression?
Which of the following is a disadvantage of network compression?A. Higher storage requirementsB. Longer transmission timeC. Higher compute requirementsD....
This protocol is responsible for transferring e-mail messages from one mail server to another over the Internet.
This protocol is responsible for transferring e-mail messages from one mail server to another over the Internet.A. DNSB. HTTPSC. FTPD. SMTPAnswer: D....
Which of these ports is the well-known port for the Telnet service?
Which of these ports is the well-known port for the Telnet service?A. 25B. 22C. 23D. 443Answer: C. Telnet uses port 23 by default for its commun...
In a network environment _______ is responsible for assigning IP addresses to computers and _______ is responsible for resolving those IP addresses to names.
In a network environment _______ is responsible for assigning IP addresses to computers and _______ is responsible for resolving those IP addresses to...
SFTP uses _________ to secure FTP communication.
SFTP uses _________ to secure FTP communication.A. CertificatesB. FTPSC. SSHD. SMTPAnswer: C. SFTP uses SSH keys to secure FTP communicati...
Which of the following protocols and ports is used to secure communication over the Internet?
Which of the following protocols and ports is used to secure communication over the Internet?A. HTTP over port 80B. SMTP over port 25C. FTP over port...
Which of the following technologies allows you to logically segment a LAN into different broadcast domains?
Which of the following technologies allows you to logically segment a LAN into different broadcast domains?A. MANB. WANC. VLAND. SANAnswer: C. A...
Which of the following IP addresses is in a private IP range?
Which of the following IP addresses is in a private IP range?A. 12.152.36.9B. 10.10.10.10C. 72.64.53.89D. 173.194.96.3Answer: B. 10.0.0.0-10.255.255.255...
Which process allows a router to modify packets so that multiple devices can share a single public IP address?
Which process allows a router to modify packets so that multiple devices can share a single public IP address?A. NATB. DNSC. VLAND. SubnettingAnswer: A....
You administer a website that receives thousands of hits per second. You notice the web server hosting the website is operating at close to capacity. What solution would you recommend to improve the performance of the website?
You administer a website that receives thousands of hits per second. You notice the web server hosting the website is operating at close to capacity....
After taking a new job at the state university, you are asked to recommend a network topology that best fits the large college campus. The network needs to span the entire campus. Which network topology would you recommend?
After taking a new job at the state university, you are asked to recommend a network topology that best fits the large college campus. The network needs...
Which of the following causes network performance to deteriorate and delays network response time?
Which of the following causes network performance to deteriorate and delays network response time?A. Network latencyB. CachingC. Network bandwidthD. High...
Which of the following terms defines the amount of data that can be sent across a network at a given time?
Which of the following terms defines the amount of data that can be sent across a network at a given time?A. Network latencyB. BandwidthC. CompressionD....
Which of the following is a network of multiple networks relying on network devices and common protocols to transfer data from one destination to another until it reaches its final destination and is accessible from anywhere?
Which of the following is a network of multiple networks relying on network devices and common protocols to transfer data from one destination to another...
Which of the following statements describes the difference between an extranet and an intranet network configuration?
Which of the following statements describes the difference between an extranet and an intranet network configuration?A. An intranet does not require a...
Which network type is not accessible from outside the organization by default?
Which network type is not accessible from outside the organization by default?A. InternetB. ExtranetC. IntranetD. LANAnswer: C. An intranet is a...
What are the ideal goals of cloud system deployment from the perspective of the user? Name three.
What are the ideal goals of cloud system deployment from the perspective of the user? Name three.1. Reduce your it costs by not having to maintain on...
Which type of document details baseline performance measurements for cloud resource performance?
Which type of document details baseline performance measurements for cloud resource performance?A. BIAB. BCPC. DRPD. SLAAnswer: D. ...
Which of the following statement regarding cloud computing is correct?
Which of the following statement regarding cloud computing is correct?A. Infrastructure provisioning time is increased.B. IT capital expenditures are...
Storing huge number of files in the cloud for a variety of projects makes it difficult to locate files related to a single project. Which solution involves the least amount of administrative effort?
Storing huge number of files in the cloud for a variety of projects makes it difficult to locate files related to a single project. Which solution involves...
A public website experiences unpredictable usage spikes for the past few months and had slowed down the application to unacceptable levels. What should be configured to ensure performance is optimal during usage spikes?
A public website experiences unpredictable usage spikes for the past few months and had slowed down the application to unacceptable levels. What should...
Which of the following is a cloud computing characteristic?
Which of the following is a cloud computing characteristic?A. Tracking the amount of hours a virtual machine has been runningB. Running virtual machines...
Your company stores budget forecasting data on a local file server at headquarters. An on-premises virtual machine periodically replicates file server data to the public cloud as an off-site backup. What type of cloud is used for this scenario?
Your company stores budget forecasting data on a local file server at headquarters. An on-premises virtual machine periodically replicates file server...
Which type of cloud service model is most likely to be used by Software developers?
Which type of cloud service model is most likely to be used by Software developers?A. SaaSB. PaaSC. CaaSD. IaaSAnswer: B. P...
An IT consultant for a medium-sized medical practice has been asked to determine which outsourced cloud solutions would best meet regulatory requirements for the health industry. Which type of cloud is best suited for this scenario?
An IT consultant for a medium-sized medical practice has been asked to determine which outsourced cloud solutions would best meet regulatory requirements...
g on-premises PBX telephony solution instead. Which category of cloud services does this apply to?
g on-premises PBX telephony solution instead. Which category of cloud services does this apply to?A. CaaSB. SaaSC. PaaSD. IaaSAnswer: A. C...
Which of the following models should a company use if they need to archive records for long periods of time?
Which of the following models should a company use if they need to archive records for long periods of time?A. SaaSB. PaaSC. IaaSD. CaaSAnswer: C....
A website administrator is storing a large amount of multimedia objects in binary format for the corporate website. What type of storage object is this considered to be?
A website administrator is storing a large amount of multimedia objects in binary format for the corporate website. What type of storage object is this...
When you run out of computer resources in your internal data center and expand to an external cloud on demand, this is an example of what?
When you run out of computer resources in your internal data center and expand to an external cloud on demand, this is an example of what?A. SaaSB. Hybrid...
Which statement defines chargeback?
Which statement defines chargeback?A. The recovery of costs from consumers of cloud servicesB. The process of identifying costs and assigning them to...
Which of the following would be considered an advantage of cloud computing?
Which of the following would be considered an advantage of cloud computing?A. Increased securityB. Ability to scale to meet growing usage demandsC. Ease...
Which of the following statements is a benefit of a hybrid cloud?
Which of the following statements is a benefit of a hybrid cloud?A. Data security managementB. Requirement of a major financial investmentC. Dependency...
Which of the following statements would be used to explain a private cloud but not a public cloud?
Which of the following statements would be used to explain a private cloud but not a public cloud?A. Used as a service via the InternetB. Dedicated to...
A cloud deployment has been created explicitly for the finance department. What type of cloud deployment would this be defined as?
A cloud deployment has been created explicitly for the finance department. What type of cloud deployment would this be defined as?A. Public cloudB. Hybrid...
What type of computing solution would be defined as a platform that is implemented within the corporate firewall and is under the control of the IT department?
What type of computing solution would be defined as a platform that is implemented within the corporate firewall and is under the control of the IT department?A....
Which of the following is usually accessed via a web browser?
Which of the following is usually accessed via a web browser?A. IaaSB. SaaSC. PaaSD. Virtual machinesAnswer: C. PaaS provides a platform to allow...
Which of the following cloud solutions provides only hardware and network resources to make up a cloud environment?
Which of the following cloud solutions provides only hardware and network resources to make up a cloud environment?A. SaaSB. CaaSC. PaaSD. IaaSAnswer: D....
Voice over IP (VoIP) is an example of what type of cloud service?
Voice over IP (VoIP) is an example of what type of cloud service?A. IaaSB. PaaSC. MaaSD. CaaSAnswer: D. Voice over IP is an example of Ca...
Which term is used to define the increasing number of services delivered over the Internet?
Which term is used to define the increasing number of services delivered over the Internet?A. XaaSB. CaaSC. MaaSD. C-MaaSAnswer: A. XaaS is a collective...
Which of the following would be considered an example of IaaS?
Which of the following would be considered an example of IaaS?A. Providing productivity software for use over the InternetB. A multiuser program that...
A software developing company just finished performing multiple P2V migrations of Windows and Linux on-premises servers to the public cloud. However, only the Linux servers are reachable over SSH. What should be configured to ensure the Windows servers are reachable for remote administration?
A software developing company just finished performing multiple P2V migrations of Windows and Linux on-premises servers to the public cloud. However,...
Your global organization has worldwide support centers. When a site in one time zone closes, it hands off operations at the end of the work shift to another site that is open for business. What support model needs to be implemented?
Your global organization has worldwide support centers. When a site in one time zone closes, it hands off operations at the end of the work shift to another...
Which of the following method should be employed to move a busy virtual machine's storage to a faster storage array?
Which of the following method should be employed to move a busy virtual machine's storage to a faster storage array?A. Storage migrationB. Virtual machine...
You are managing a busy on-premises file server that needs to be migrated to the cloud as a virtual machine. Which of the following method should you employ?
You are managing a busy on-premises file server that needs to be migrated to the cloud as a virtual machine. Which of the following method should you...
A software developing organization needs a quick, consistent method of creating cloud-based software testing environments with specific operating system and application software configurations. What should they configure?
A software developing organization needs a quick, consistent method of creating cloud-based software testing environments with specific operating system...
______ is required before installing a type 2 hypervisor.
______ is required before installing a type 2 hypervisor.A. NIC teaming softwareB. Operating systemC. Class C IP addressD. SmartcardAnswer: B. Operating...
Your organization has numerous newly deployed virtual machines (VMs) in a public cloud. You are responsible for ensuring the VMs are malware free. What is the FIRST item you should configure?
Your organization has numerous newly deployed virtual machines (VMs) in a public cloud. You are responsible for ensuring the VMs are malware free. What...
In a PKI, network data is normally encrypted with the recipient's ____________ key.
In a PKI, network data is normally encrypted with the recipient's ____________ key.A. SymmetricB. AsymmetricC. PublicD. PrivateAnswer: C. Pub...
Sam is the virtualization administrator for several hypervisor hosts. There is limited disk space and he does not know how much disk space each virtual machine will require over time. Which virtual disk type should he use?
Sam is the virtualization administrator for several hypervisor hosts. There is limited disk space and he does not know how much disk space each virtual...
Jumbo Frames allow for less packet overhead.
Jumbo Frames allow for less packet overhead.TrueFalseAnswer: T...
The ability to deduplicate virtual machine memory pages for optimal memory usage is called:
The ability to deduplicate virtual machine memory pages for optimal memory usage is called:A. Page swappingB. Transparent page sharingC. BallooningD....
________ is a memory management technique that takes unused memory from virtual machines and allocates it where it is needed by other virtual machines.
________ is a memory management technique that takes unused memory from virtual machines and allocates it where it is needed by other virtual machines.A....
____ hypervisor does not require an existing operating system.
_________ hypervisor does not require an existing operating system.A. Type AB. Type 1C. Type 2D. Type BAnswer: B. Type...
You are planning your migration to a virtual environment. Which of the following physical servers should be migrated first?
You are planning your migration to a virtual environment. Which of the following physical servers should be migrated first?A. A development serverB. A...
After a successful P2V migration, which of the following tests, if any, should be completed on the new virtual machine?
After a successful P2V migration, which of the following tests, if any, should be completed on the new virtual machine?A. Testing is not required.B. Remove...
You notice that one of your virtual machines will not successfully complete an online migration to a hypervisor host. Which of the following is most likely preventing the migration process from completing?
You notice that one of your virtual machines will not successfully complete an online migration to a hypervisor host. Which of the following is most likely...
You are migrating a physical server to a virtual server. The server needs to remain available during the migration process. What type of migration would you use?
You are migrating a physical server to a virtual server. The server needs to remain available during the migration process. What type of migration would...
You need to create an exact copy of a virtual machine to deploy in a development environment. Which of the following processes is the best option?
You need to create an exact copy of a virtual machine to deploy in a development environment. Which of the following processes is the best option?A. Storage...
Which of the following allows you to migrate a virtual machine's storage to a different storage device while the virtual machine remains operational?
Which of the following allows you to migrate a virtual machine's storage to a different storage device while the virtual machine remains operational?A....
You have been tasked with deploying a group of virtual machines quickly and efficiently with the same standard configurations. What process would you use?
You have been tasked with deploying a group of virtual machines quickly and efficiently with the same standard configurations. What process would you...
An application was installed on a virtual machine and is now having issues. The application provider has asked you to install the application on a physical server. Which migration process would you use to test the application on a physical server?
An application was installed on a virtual machine and is now having issues. The application provider has asked you to install the application on a physical...
You have been tasked with migrating a virtual machine to a new host computer. Which migration process would be required?
You have been tasked with migrating a virtual machine to a new host computer. Which migration process would be required?A. V2VB. V2PC. P2PD. P2VAnswe...
Your organization is planning on migrating its data center, and you as the administrator have been tasked with reducing the footprint of the new data center by virtualizing as many servers as possible. A physical server running a legacy application has been identified as a candidate for virtualization. Which of the following methods would you use to migrate the server to the new data center?
Your organization is planning on migrating its data center, and you as the administrator have been tasked with reducing the footprint of the new data...
Which of the following gives a cloud provider the ability to distribute resources on an as-needed basis to the cloud consumer and in turn helps to improve efficiency and reduce costs?
Which of the following gives a cloud provider the ability to distribute resources on an as-needed basis to the cloud consumer and in turn helps to improve...
How does virtualization help to consolidate an organization's infrastructure?
How does virtualization help to consolidate an organization's infrastructure?A. It allows a single application to be run on a single computer.B. It allows...
Which of the following data centers offers the same concepts as a physical data center with the benefits of cloud computing?
Which of the following data centers offers the same concepts as a physical data center with the benefits of cloud computing?A. Private data centerB. Public...
Which of the following allows you to scale resources up and down dynamically as required for a given application?
Which of the following allows you to scale resources up and down dynamically as required for a given application?A. SubnettingB. Resource poolingC. ElasticityD....
Which of the following could not be used as one part of a multi-factor authentication solution?
Which of the following could not be used as one part of a multi-factor authentication solution?A. FingerprintB. TokenC. ReferenceD. Proximity cardAns...
Which piece of information is required to create a DHCP reservation?
Which piece of information is required to create a DHCP reservation?A. MAC addressB. Default gatewayC. Server nameD. Host recordAnswer: ...
Which component controls how the network traffic flows between the virtual machines and the host computer and also how network traffic flows between the virtual machine and other network devices in the organization?
Which component controls how the network traffic flows between the virtual machines and the host computer and also how network traffic flows between the...
Which type of memory allows a virtual machine to start with a smaller amount of memory and increase it based on the workload of the virtual machine?
Which type of memory allows a virtual machine to start with a smaller amount of memory and increase it based on the workload of the virtual machine?A....
Which of the following groups multiple network storage devices into a single storage unit that can be managed from a central console and used by a virtual machine or host computer?
Which of the following groups multiple network storage devices into a single storage unit that can be managed from a central console and used by a virtual...
An administrator deploys a new virtual machine. After logging on to the virtual machine, she notices that it has a different time setting than the host. What is most likely the cause of this issue?
An administrator deploys a new virtual machine. After logging on to the virtual machine, she notices that it has a different time setting than the host....
In a virtual machine, which component appears as an Ethernet adapter?
In a virtual machine, which component appears as an Ethernet adapter?A. Virtual HBAB. Virtual NICC. Virtual switchD. Virtual routerAnswer:&nbs...
Which of the following would be a requirement when planning the compute resources for a host computer?
Which of the following would be a requirement when planning the compute resources for a host computer?A. The host computer does not need to have enough...
You have been tasked with planning the purchase of a new virtualization host computer. When it comes time to recommend the processor type, which processor capability is more important?
You have been tasked with planning the purchase of a new virtualization host computer. When it comes time to recommend the processor type, which processor...
An administrator is trying to enable hardware-assisted virtualization in the BIOS of a computer and notices it is not an option. He checks the specification on the manufacturer's website and finds that the system should support hardware-assisted virtualization. What is most likely the reason why he can't enable it?
An administrator is trying to enable hardware-assisted virtualization in the BIOS of a computer and notices it is not an option. He checks the specification...
You are deploying two virtual servers. One of the virtual servers is a heavily used database server and the other is a lightly used print server. What virtual CPU configuration would you recommend?
You are deploying two virtual servers. One of the virtual servers is a heavily used database server and the other is a lightly used print server. What...
An administrator is testing a variety of operating systems while performing other functions like surfing the Internet and word processing. What type of hypervisor is the admin most likely using?
An administrator is testing a variety of operating systems while performing other functions like surfing the Internet and word processing. What type of...
What type of hypervisor is provided to an enterprise to use without cost?
What type of hypervisor is provided to an enterprise to use without cost?A. ProprietaryB. Open sourceC. Type 1D. Type 2Answer:&nbs...
Which of the following hypervisors runs on a bare metal system?
Which of the following hypervisors runs on a bare metal system?A. Open sourceB. ProprietaryC. Type 1D. Type 2Answer:&nbs...
You are investigating which technology is best suited for virtualizing a server operating system for personal use on a desktop computer. Which of the following technologies would you recommend?
You are investigating which technology is best suited for virtualizing a server operating system for personal use on a desktop computer. Which of the...
Which of the following hypervisors would provide the best performance for a host machine?
Which of the following hypervisors would provide the best performance for a host machine?A. Type 1B. Type 2C. Open sourceD. ProprietaryAnswer:&nbs...
Subscribe to:
Posts (Atom)