Which of the following is not a benefit of standardization?

Which of the following is not a benefit of standardization?


  • Consistent management
  • Better control of system access
  • Uniform logging across systems
  • Flexible deployment scenarios


Answer: Flexible deployment scenarios

Which of the following is not a method for deploying application updates?

Which of the following is not a method for deploying application updates?


  • Manual version updating
  • End-user updating
  • Using DevOps ticketing
  • Using a package manager


Answer: DevOps ticketing is not a method for deploying application updates. The methods are manual version updating, end-user updating, and using a package manager.


Donna has been developing software for her company. She makes a copy of the directory where her code is stored each time she makes a significant change. However, the project she started years ago is now much larger and there are two other developers who also work on the program with her. She would like a way to better manage the code so that she can revert to previous states if necessary and track changes made by each person. Which technology would you suggest?

Donna has been developing software for her company. She makes a copy of the directory where her code is stored each time she makes a significant change. However, the project she started years ago is now much larger and there are two other developers who also work on the program with her. She would like a way to better manage the code so that she can revert to previous states if necessary and track changes made by each person. Which technology would you suggest?


  • Continuous integration application
  • Code repository
  • Workflow automation
  • Chargebacks for each developer


Answer: A code repository organizes code branches to keep code consistent even when multiple teams are working on the same areas in parallel. Developers can publish code changes to the repository, can synchronize their local copy of the code with the repository, or can revert to previously published versions.


Which of the following is not a benefit of standardization?

Which of the following is not a benefit of standardization?


  • Consistent management
  • Better control of system access
  • Uniform logging across systems
  • Flexible deployment scenarios


Answer: Flexible deployment scenarios is not a benefit of standardization because standardization establishes consistent deployment scenarios and does not allow for each one to be deployed however the user or administrator wishes.

When should maintenance windows be scheduled?

When should maintenance windows be scheduled?


  • In the morning
  • In the evening
  • On weekends
  • When they will least impact customers


Answer: A maintenance window is an agreed-upon, predefined time period during which service interruptions are least impactful to the customer. This could fall at any time, and depends on the patterns of business activity for that particular customer.


Carlos works in the IT department at Sample Bank. He uses a cloud-based e-mail system and has been asked by his manager to establish metrics on mailbox usage per department so that department budgets can be billed for the expense of hosting department e-mail. What is this practice known as?

Carlos works in the IT department at Sample Bank. He uses a cloud-based e-mail system and has been asked by his manager to establish metrics on mailbox usage per department so that department budgets can be billed for the expense of hosting department e-mail. What is this practice known as?


  • Chargeback
  • Billback
  • Pass-through charge
  • Showback


Answer: Chargebacks can be used to establish metrics on mailbox usage per department so that department budgets can be billed for the expense of hosting department e-mail.

Capacity management has responsibility for ensuring that the capacity of the IT service is optimally matched to what?

Capacity management has responsibility for ensuring that the capacity of the IT service is optimally matched to what?


  • Demand
  • Future trends
  • Procedures
  • Availability


Answer: Capacity management's primary objective is to ensure that the capacity of an IT service is optimally matched with its demand. Capacity should be planned to meet agreed-upon levels, no higher and no lower. Because controlling costs is a component of capacity management, designs that incorporate too much capacity are just as bad as designs that incorporate too little capacity.


Which of these options is not a valid mechanism for improving disk performance?

Which of these options is not a valid mechanism for improving disk performance?


A. Replacing rotational media with solid state media

B. Replacing rotational media with higher-speed rotational media

C. Decreasing disk quotas

D. Employing a different configuration for the RAID array


Answer: C. Decreasing disk quotas helps with capacity issues, but not with performance.

You need to divide your virtualized environment into groups that can be managed by separate groups of administrators. Which of these tools can you use?

You need to divide your virtualized environment into groups that can be managed by separate groups of administrators. Which of these tools can you use?


A. Quotas

B. CPU affinity

C. Resource pools

D. Licensing Optimizing Performance


Answer: C. Resource pools allow the creation of a hierarchy of guest virtual machine groups that can have different administrative privileges assigned to them.


What do you need to employ if you have a serial device that needs to be utilized by a virtual machine?

What do you need to employ if you have a serial device that needs to be utilized by a virtual machine?


A. Network isolation

B. Physical resource redirection

C. V2V

D. Storage migration


Answer: B. Physical resource redirection enables virtual machines to utilize physical hardware as if they were physical hosts that could connect to the hardware directly.


When would a reservation be used?

When would a reservation be used?


A. When a maximum amount of resources needs to be allocated to a specific resource

B. When a minimum amount of capacity needs to be available at all times to a specific resource

C. When capacity needs to be measured and controlled

D. When planning a dinner date


Answer: B. A reservation should be used when there is a minimum amount of resources that needs to have guaranteed capacity.


How are quotas defined?

How are quotas defined?


A. By management systems

B. According to service level agreements that are defined between providers and their customers

C. Through trend analysis and its results

D. With spreadsheets and reports


Answer: B. Quotas are defined according to service level agreements that are negotiated between a provider and its customers.


Quotas are a mechanism for enforcing what?

Quotas are a mechanism for enforcing what?


A. Limits

B. Rules

C. Access restrictions

D. Virtualization


Answer: A. Quotas are limits on the resources that can be utilized for a specific entity on a system. For example, a user could be limited to storing up to 10GB of data on a server or a virtual machine limited to 500GB of bandwidth each month.


Which of the following would be considered a host compute resource?

Which of the following would be considered a host compute resource?


A. Cores

B. Power supply

C. Processor

D. Bandwidth


Answer: C. The four compute resources used in virtualization are disk, memory, processor, and network. On a host, these are available as the physical entities of hard disks, memory chips, processors, and network interface cards (NICs).


An existing on-premises application will no longer be used in your company's public cloud implementation. Instead, a functional cloud equivalent will be used. To which aspect of the application life cycle does this apply?

An existing on-premises application will no longer be used in your company's public cloud implementation. Instead, a functional cloud equivalent will be used. To which aspect of the application life cycle does this apply?


A. Application upgrade

B. Application retirement

C. Application replacement

D. Application migration


Answer: C. Application replacement

What is the desired end result of ITIL?

What is the desired end result of ITIL?


A. CAB

B. Continual service improvement

C. Service strategy

D. Service operation


Answer: B. The end result of each cycle within ITIL is to identify opportunities for improvement that can be incorporated into the service to make it more efficient, effective, and profitable


Which of the following terms best describes life cycle management?

Which of the following terms best describes life cycle management?


A. Baseline

B. Finite

C. Linear

D. Continuum


Answer: D. Life cycle management is a continuum with feedback loops going back into itself to enable better management and continual improvement


Which of the following is a benefit of remote hypervisor administration?

Which of the following is a benefit of remote hypervisor administration?


A. Only being able to modify one hypervisor host at a time

B. Being able to remotely manage multiple hypervisor hosts from a single console

C. Not having access to a hypervisor host

D. Remotely accessing a hypervisor host has no benefit Life Cycle Management


Answer: B. The ability to remotely manage multiple hypervisor hosts from a single console from your workstation allows for a quick and easy way to make changes to multiple hosts and is an important benefit of remote hypervisor administration.


Which of the following would be used to directly connect to a hypervisor host remotely to modify operating system settings on the hypervisor host?

Which of the following would be used to directly connect to a hypervisor host remotely to modify operating system settings on the hypervisor host?


A. RDP

B. Console port

C. SMTP

D. HTTPS


Answer: A. The Remote Desktop Protocol (RDP) lets you establish a remote connection directly to a hypervisor host. It allows you to change system settings on the hypervisor host computer itself.


You have been tasked with gathering a list of software installed on all the computers in your environment. You want to gather this information remotely. Which of the following would you use to gather this information?

You have been tasked with gathering a list of software installed on all the computers in your environment. You want to gather this information remotely. Which of the following would you use to gather this information?


A. WMI

B. SNMP

C. HTTP

D. Syslog


Answer: A. With Windows Management Instrumentation (WMI), it is possible to query workstations remotely and gather a list of all the software installed on those workstations.


You receive an alert that a virtual machine is down. The server does not respond to a ping. What tool should you use to troubleshoot the server if you are off-site?

You receive an alert that a virtual machine is down. The server does not respond to a ping. What tool should you use to troubleshoot the server if you are off-site?


A. Console port

B. SSH

C. Hypervisor console

D. SMTP


Answer: B. Secure Shell (SSH) provides a secure way to remotely manage network devices, including hypervisor hosts.

Which of the following allows for out-of-band management of a computer?

Which of the following allows for out-of-band management of a computer?


A. WMI

B. SMS

C. SNMP

D. IPMI Remote-Access Tools


Answer: D. The Intelligent Platform Management Interface (IPMI) operates independently of the operating system. It provides out-of-band management and monitoring of a system before the operating system is loaded, which allows BIOS settings to be remotely monitored or configured


Which of the following constantly executes a software component called an agent, which reports information using the protocol back to a manager?

Which of the following constantly executes a software component called an agent, which reports information using the protocol back to a manager?


A. WMI

B. SMTP

C. SMS

D. SNMP


Answer: D. A monitoring solution that uses SNMP has an administrative computer, commonly referred to as a manager, that monitors or manages a group of network devices. Each managed device constantly executes a software component, called an agent, that reports back to the manager


Which of the following can be used to create scripts that can be run against target computers to perform simple administrative tasks?

Which of the following can be used to create scripts that can be run against target computers to perform simple administrative tasks?


A. WMI

B. SMTP

C. SMS

D. IMAP


Answer: A. Windows Management Instrumentation (WMI) allows you to write scripts to automate certain administrative tasks and run those scripts against remote computers


Which of the following utilizes UDP port 514 when collecting events?

Which of the following utilizes UDP port 514 when collecting events?


A. SNMP

B. Syslog

C. WMI

D. We services


Answer: B. Syslog provides a mechanism for a network device to send event messages to a logging server or syslog server using UDP port 514 or TCP 514


Which of these can be used by both a cloud consumer and a cloud provider to give a visual picture of performance metrics?

Which of these can be used by both a cloud consumer and a cloud provider to give a visual picture of performance metrics?


A. API

B. SNMP

C. Dashboard

D. SMTP


Answer: C. A dashboard is a great way for both the cloud consumer and cloud provider to access key metrics when it comes to monitoring cloud resources. A dashboard can give a summary of the current usage of the cloud resources in an easy-to-view format of charts and graphs


Which of the following can be used to identify which operating system version is installed on a virtual machine?

Which of the following can be used to identify which operating system version is installed on a virtual machine?


A. WMI

B. SMTP

C. SMS

D. IMAP


Answer: A. Windows Management Instrumentation (WMI) provides an administrator a way to gather hardware information from multiple physical servers or virtual servers and put that information into a centralized database


Users complain that Internet access has been intermittent. You check the configuration of a user system and discover it has an IP address beginning with 169.254. What is the problem?

Users complain that Internet access has been intermittent. You check the configuration of a user system and discover it has an IP address beginning with 169.254. What is the problem?


A. The DHCP server cannot be reached.

B. The default gateway cannot be reached.

C. The DNS server cannot be reached.

D. The proxy server cannot be reached.


Answer: A. The DHCP server cannot be reached.

Andrew is a cloud network administrator. Cloud-based virtual machines hosting a custom web application have been deployed to a single cloud virtual network that currently has no Internet access. Each virtual machine must have Internet access, while incoming connections initiated from the Internet must be blocked. Which solution should the administrator deploy?

Andrew is a cloud network administrator. Cloud-based virtual machines hosting a custom web application have been deployed to a single cloud virtual network that currently has no Internet access. Each virtual machine must have Internet access, while incoming connections initiated from the Internet must be blocked. Which solution should the administrator deploy?


A. Forward proxy host

B. Packet filtering firewall

C. Web application firewall

D. NAT

E. Host based firewall


Answer: D. NAT

Lisa is responsible for a web application running in the public cloud. Recent performance metrics indicate that the average user wait time for page loads is four seconds due to the high number of HTTP requests. What should she configure?

Lisa is responsible for a web application running in the public cloud. Recent performance metrics indicate that the average user wait time for page loads is four seconds due to the high number of HTTP requests. What should she configure?


A. Compression

B. Load balancing

C. Proxying

D. PKI


Answer: B. Load balancing

Which of the following is a disadvantage of network compression?

Which of the following is a disadvantage of network compression?


A. Higher storage requirements

B. Longer transmission time

C. Higher compute requirements

D. Shorter transmission time

E. Higher latency


Answer: C. Higher compute requirements

In a network environment _______ is responsible for assigning IP addresses to computers and _______ is responsible for resolving those IP addresses to names.

In a network environment _______ is responsible for assigning IP addresses to computers and _______ is responsible for resolving those IP addresses to names.


A. DNS, DHCP

B. DHCP, DNS

C. HTTP, DNS

D. DHCP, SMTP


Answer: B. DHCP is responsible for assigning IP addresses to computers and DNS is responsible for resolving those IP addresses to names.


Which process allows a router to modify packets so that multiple devices can share a single public IP address?

Which process allows a router to modify packets so that multiple devices can share a single public IP address?


A. NAT

B. DNS

C. VLAN

D. Subnetting


Answer: A. NAT allows your router to change your private IP address into a public IP address so that you can access resources that are external to your organization; then the router tracks those IP address changes.

You administer a website that receives thousands of hits per second. You notice the web server hosting the website is operating at close to capacity. What solution would you recommend to improve the performance of the website?

You administer a website that receives thousands of hits per second. You notice the web server hosting the website is operating at close to capacity. What solution would you recommend to improve the performance of the website?


A. Caching

B. Network load balancing

C. Compression

D. Network bandwidth


Answer: B. Network load balancing is used to increase performance and provide redundancy for websites and applications.

After taking a new job at the state university, you are asked to recommend a network topology that best fits the large college campus. The network needs to span the entire campus. Which network topology would you recommend?

After taking a new job at the state university, you are asked to recommend a network topology that best fits the large college campus. The network needs to span the entire campus. Which network topology would you recommend?


A. LAN

B. WAN

C. MAN

D. SAN


Answer: C. A metropolitan area network (MAN) can connect multiple LANs and is used to build networks with high data connection speeds for cities or college campuses.

Which of the following causes network performance to deteriorate and delays network response time?

Which of the following causes network performance to deteriorate and delays network response time?


A. Network latency

B. Caching

C. Network bandwidth

D. High CPU and memory usage


Answer: A. Network latency is a time delay that is encountered while data is being sent from one point to another on the network and impacts network bandwidth and performance.


Which of the following is a network of multiple networks relying on network devices and common protocols to transfer data from one destination to another until it reaches its final destination and is accessible from anywhere?

Which of the following is a network of multiple networks relying on network devices and common protocols to transfer data from one destination to another until it reaches its final destination and is accessible from anywhere?


A. Intranet

B. Extranet

C. Internet

D. LAN


Answer: C. The Internet is not controlled by a single entity and serves billions of users around the world

Which of the following statements describes the difference between an extranet and an intranet network configuration?

Which of the following statements describes the difference between an extranet and an intranet network configuration?


A. An intranet does not require a firewall.

B. An extranet requires less administration than an intranet.

C. An intranet is owned and operated by a single organization.

D. An extranet allows controlled access from outside the organization.


Answer: D. An extranet is an extension of an intranet with the primary difference being that an extranet allows controlled access from outside the organization.

Which network type is not accessible from outside the organization by default?

Which network type is not accessible from outside the organization by default?


A. Internet

B. Extranet

C. Intranet

D. LAN


Answer: C. An intranet is a private network that is configured and controlled by a single organization and is only accessible by users that are internal to that organization.


What are the ideal goals of cloud system deployment from the perspective of the user? Name three.

What are the ideal goals of cloud system deployment from the perspective of the user? Name three.


1. Reduce your it costs by not having to maintain on site servers.


2. Ability to "Pay-as-you-grow", avoiding prohibitive up front costs when you're first starting out.


3. Ability to access applications/software without necessarily having it locally installed.

Which of the following statement regarding cloud computing is correct?

Which of the following statement regarding cloud computing is correct?


A. Infrastructure provisioning time is increased.

B. IT capital expenditures are increased.

C. Infrastructure provisioning time is decreased.

D. Application provisioning is increased


Answer: C. Infrastructure provisioning time is decreased.

Storing huge number of files in the cloud for a variety of projects makes it difficult to locate files related to a single project. Which solution involves the least amount of administrative effort?

Storing huge number of files in the cloud for a variety of projects makes it difficult to locate files related to a single project. Which solution involves the least amount of administrative effort?


A. Add project name metadata to cloud-stored files.

B. Configure each project in its own cloud tenancy.

C. Enable file auto-scaling

D. Enable departmental chargeback


Answer: A. Add project name metadata to cloud-stored files

A public website experiences unpredictable usage spikes for the past few months and had slowed down the application to unacceptable levels. What should be configured to ensure performance is optimal during usage spikes?

A public website experiences unpredictable usage spikes for the past few months and had slowed down the application to unacceptable levels. What should be configured to ensure performance is optimal during usage spikes?


A. Faster Internet connection from on premises to the cloud

B. Auto-scaling

C. Reduced virtual machine logging

D. Content delivery network


Answer: B. Auto-scaling

Which of the following is a cloud computing characteristic?

Which of the following is a cloud computing characteristic?



A. Tracking the amount of hours a virtual machine has been running

B. Running virtual machines on a hypervisor

C. Centralized patch management

D. Automatic backup


Answer: A. Tracking the amount of hours a virtual machine has been running

Your company stores budget forecasting data on a local file server at headquarters. An on-premises virtual machine periodically replicates file server data to the public cloud as an off-site backup. What type of cloud is used for this scenario?

Your company stores budget forecasting data on a local file server at headquarters. An on-premises virtual machine periodically replicates file server data to the public cloud as an off-site backup. What type of cloud is used for this scenario?


A. Community

B. Private

C. Hybrid

D. Public


Answer: Hybrid

An IT consultant for a medium-sized medical practice has been asked to determine which outsourced cloud solutions would best meet regulatory requirements for the health industry. Which type of cloud is best suited for this scenario?

An IT consultant for a medium-sized medical practice has been asked to determine which outsourced cloud solutions would best meet regulatory requirements for the health industry. Which type of cloud is best suited for this scenario?


A. Private

B. Public

C. Health

D. Community


Answer: D. Community

A website administrator is storing a large amount of multimedia objects in binary format for the corporate website. What type of storage object is this considered to be?

A website administrator is storing a large amount of multimedia objects in binary format for the corporate website. What type of storage object is this considered to be?


A. BLOB

B. Replica

C. Metadata

D. Object ID


Answer: A. A BLOB is a collection of binary data that is stored as a single entity. BLOBs are primarily used to store images, videos, and sound.


When you run out of computer resources in your internal data center and expand to an external cloud on demand, this is an example of what?

When you run out of computer resources in your internal data center and expand to an external cloud on demand, this is an example of what?


A. SaaS

B. Hybrid cloud

C. Cloud bursting

D. Elasticity


Answer: C. Cloud bursting allows you to add additional resources from an external cloud on an on-demand basis. The internal resource is the private cloud and the external resource is the public cloud.


Which statement defines chargeback?

Which statement defines chargeback?


A. The recovery of costs from consumers of cloud services

B. The process of identifying costs and assigning them to specific cost categories

C. A method of ensuring that cloud computing becomes a profit instead of a cost

D. A system for confirming that billing occurs for the cloud services being used


Answer: A. The purpose of a chargeback system is to measure the costs of IT services, hardware, or software and recover them from the business unit that used them.


Which of the following would be considered an advantage of cloud computing?

Which of the following would be considered an advantage of cloud computing?


A. Increased security

B. Ability to scale to meet growing usage demands

C. Ease of integrating equipment hosted in other data centers

D. Increased privacy for corporate data


Answer: B. One of the benefits of cloud computing is the ability to easily scale and add resources to meet the growth of the organization.

Which of the following statements is a benefit of a hybrid cloud?

Which of the following statements is a benefit of a hybrid cloud?


A. Data security management

B. Requirement of a major financial investment

C. Dependency of internal IT department

D. Complex networking


Answer: A. A hybrid cloud offers the ability to keep the organization's mission-critical data behind a firewall and outside of the public cloud.


Which of the following statements would be used to explain a private cloud but not a public cloud?

Which of the following statements would be used to explain a private cloud but not a public cloud?


A. Used as a service via the Internet

B. Dedicated to a single organization

C. Requires users to pay a monthly fee to access services

D. Provides incremental scalability


Answer: A private cloud is dedicated to a single organization and is contained with the corporate firewall.

A cloud deployment has been created explicitly for the finance department. What type of cloud deployment would this be defined as?

A cloud deployment has been created explicitly for the finance department. What type of cloud deployment would this be defined as?


A. Public cloud

B. Hybrid cloud

C. Community cloud

D. Private cloud


Answer: C. A community cloud is a cloud solution that provides services to a specific or limited number of individuals who share a common computing need.


What type of computing solution would be defined as a platform that is implemented within the corporate firewall and is under the control of the IT department?

What type of computing solution would be defined as a platform that is implemented within the corporate firewall and is under the control of the IT department?


A. Private cloud

B. Public cloud

C. VLAN

D. VPN


Answer: A. A private cloud is a cloud computing solution that is implemented behind a corporate firewall and is under the control of the internal IT department.


Which of the following is usually accessed via a web browser?

Which of the following is usually accessed via a web browser?


A. IaaS

B. SaaS

C. PaaS

D. Virtual machines


Answer: C. PaaS provides a platform to allow developers to build applications and services over the Internet. PaaS is hosted in the cloud and accessed with a web browser.


Which of the following would be considered an example of IaaS?

Which of the following would be considered an example of IaaS?


A. Providing productivity software for use over the Internet

B. A multiuser program that is hosted by a third party

C. Providing hardware resources over the Internet

D. A database that is hosted in the cloud.


Answer: C. Providing hardware resources over the Internet.

A software developing company just finished performing multiple P2V migrations of Windows and Linux on-premises servers to the public cloud. However, only the Linux servers are reachable over SSH. What should be configured to ensure the Windows servers are reachable for remote administration?

A software developing company just finished performing multiple P2V migrations of Windows and Linux on-premises servers to the public cloud. However, only the Linux servers are reachable over SSH. What should be configured to ensure the Windows servers are reachable for remote administration?


A. Allow TCP port 3389 traffic into the cloud network.

B. Allow TCP port 22 traffic into the cloud network.

C. Allow TCP port 443 traffic into the cloud network.

D. Allow TCP port 389 traffic into the cloud network.


Answer: A. Allow TCP port 3389 traffic into the cloud network.

Your global organization has worldwide support centers. When a site in one time zone closes, it hands off operations at the end of the work shift to another site that is open for business. What support model needs to be implemented?

Your global organization has worldwide support centers. When a site in one time zone closes, it hands off operations at the end of the work shift to another site that is open for business. What support model needs to be implemented?


A. Service level agreement

B. Resource pooling

C. Follow the sun

D. International VPNs


Answer: C. Follow the sun

A software developing organization needs a quick, consistent method of creating cloud-based software testing environments with specific operating system and application software configurations. What should they configure?

A software developing organization needs a quick, consistent method of creating cloud-based software testing environments with specific operating system and application software configurations. What should they configure?


A. Operating system disk image

B. Installation script

C. Software as a Service

D. Cloud templates


Answer: 

Your organization has numerous newly deployed virtual machines (VMs) in a public cloud. You are responsible for ensuring the VMs are malware free. What is the FIRST item you should configure?

Your organization has numerous newly deployed virtual machines (VMs) in a public cloud. You are responsible for ensuring the VMs are malware free. What is the FIRST item you should configure?


A. Malware definition updates

B. Virtual machine antivirus extension

C. Cloud packet filtering firewall

D. Cloud web application firewall


Answer: B. Virtual machine antivirus extension

Sam is the virtualization administrator for several hypervisor hosts. There is limited disk space and he does not know how much disk space each virtual machine will require over time. Which virtual disk type should he use?

Sam is the virtualization administrator for several hypervisor hosts. There is limited disk space and he does not know how much disk space each virtual machine will require over time. Which virtual disk type should he use?


A. Differencing

B. Dynamically expanding

C. Fixed

D. Thin provisioning


Answer: B. Dynamically expanding

You are planning your migration to a virtual environment. Which of the following physical servers should be migrated first?

You are planning your migration to a virtual environment. Which of the following physical servers should be migrated first?


A. A development server

B. A server that is running a non-mission-critical application and is not heavily utilized day to day

C. A highly utilized database server

D. A server running a mission-critical application


Answer: A and B.

You notice that one of your virtual machines will not successfully complete an online migration to a hypervisor host. Which of the following is most likely preventing the migration process from completing?

You notice that one of your virtual machines will not successfully complete an online migration to a hypervisor host. Which of the following is most likely preventing the migration process from completing?


A. The virtual machine needs more memory than the host has available.

B. The virtual machine has exceeded the allowed CPU count.

C. The virtual machine does not have the proper network configuration.

D. The virtual machine license has expired.


Answer: A

An application was installed on a virtual machine and is now having issues. The application provider has asked you to install the application on a physical server. Which migration process would you use to test the application on a physical server?

An application was installed on a virtual machine and is now having issues. The application provider has asked you to install the application on a physical server. Which migration process would you use to test the application on a physical server?


A. V2V

B. V2P

C. P2P

D. P2V


Answer: B

Your organization is planning on migrating its data center, and you as the administrator have been tasked with reducing the footprint of the new data center by virtualizing as many servers as possible. A physical server running a legacy application has been identified as a candidate for virtualization. Which of the following methods would you use to migrate the server to the new data center?

Your organization is planning on migrating its data center, and you as the administrator have been tasked with reducing the footprint of the new data center by virtualizing as many servers as possible. A physical server running a legacy application has been identified as a candidate for virtualization. Which of the following methods would you use to migrate the server to the new data center?


A. V2V

B. V2P

C. P2P

D. P2V


Answer: D

Which of the following gives a cloud provider the ability to distribute resources on an as-needed basis to the cloud consumer and in turn helps to improve efficiency and reduce costs?

Which of the following gives a cloud provider the ability to distribute resources on an as-needed basis to the cloud consumer and in turn helps to improve efficiency and reduce costs?


A. Elasticity

B. Shared resources

C. Infrastructure consolidation D. Network isolation Virtual Resource Migrations


Answer: B

How does virtualization help to consolidate an organization's infrastructure?

How does virtualization help to consolidate an organization's infrastructure?


A. It allows a single application to be run on a single computer.

B. It allows multiple applications to run on a single computer.

C. It requires more operating system licenses.

D. It does not allow for infrastructure consolidation and actually requires more compute resources.


Answer: B

Which component controls how the network traffic flows between the virtual machines and the host computer and also how network traffic flows between the virtual machine and other network devices in the organization?

Which component controls how the network traffic flows between the virtual machines and the host computer and also how network traffic flows between the virtual machine and other network devices in the organization?


A. Virtual NIC

B. Virtual storage

C. Virtual HBA

D. Virtual switch Virtualized Infrastructure Service Elements


DAnswer: 

An administrator deploys a new virtual machine. After logging on to the virtual machine, she notices that it has a different time setting than the host. What is most likely the cause of this issue?

An administrator deploys a new virtual machine. After logging on to the virtual machine, she notices that it has a different time setting than the host. What is most likely the cause of this issue?


A. The virtual machine cannot communicate with the network.

B. The guest tools are not installed.

C. The vNIC is not configured correctly.

D. The VLAN tag is incorrect.


Answer: B

Which of the following would be a requirement when planning the compute resources for a host computer?

Which of the following would be a requirement when planning the compute resources for a host computer?


A. The host computer does not need to have enough compute resources to support the virtual machine workload.

B. The host computer must have enough compute resources to support the virtual machine workload.

C. The host computer must be running a support operating system.

D. The number of virtual machines running Microsoft Windows must be known. Virtual Machine


Answer: B

You have been tasked with planning the purchase of a new virtualization host computer. When it comes time to recommend the processor type, which processor capability is more important?

You have been tasked with planning the purchase of a new virtualization host computer. When it comes time to recommend the processor type, which processor capability is more important?


A. CPUs are more important than CPU cores and cache.

B. CPU cores and cache are more important than CPUs.

C. CPU speed is more important than CPU cores and cache.

D. CPU cores and cache are more important than CPU speed.


Answer: D

An administrator is trying to enable hardware-assisted virtualization in the BIOS of a computer and notices it is not an option. He checks the specification on the manufacturer's website and finds that the system should support hardware-assisted virtualization. What is most likely the reason why he can't enable it?

An administrator is trying to enable hardware-assisted virtualization in the BIOS of a computer and notices it is not an option. He checks the specification on the manufacturer's website and finds that the system should support hardware-assisted virtualization. What is most likely the reason why he can't enable it?


A. The BIOS needs a firmware update.

B. The BIOS is corrupt.

C. Hardware-assisted virtualization is enabled in the operating system, not the BIOS. D. The firmware is corrupt.


Answer: A

You are deploying two virtual servers. One of the virtual servers is a heavily used database server and the other is a lightly used print server. What virtual CPU configuration would you recommend?

You are deploying two virtual servers. One of the virtual servers is a heavily used database server and the other is a lightly used print server. What virtual CPU configuration would you recommend?


A. One virtual CPU for the database server and two virtual CPUs for the print server

B. Two virtual CPUs for the database server and two virtual CPUs for the print server

C. Two virtual CPUs for the database server and one virtual CPU for the print server

D. Three virtual CPUs for the print server and two virtual CPUs for the database server


Answer: C

An administrator is testing a variety of operating systems while performing other functions like surfing the Internet and word processing. What type of hypervisor is the admin most likely using?

An administrator is testing a variety of operating systems while performing other functions like surfing the Internet and word processing. What type of hypervisor is the admin most likely using?


A. Type 1

B. Enterprise hypervisor

C. Type 2

D. Open source Virtualization Host


Answer: C