Which of the following would you use to remotely access a virtualization host in a secure fashion?
A. Telnet
B. Ping
C. HTTPS
D. Console port
Answer: C. HTTPS gives you a way to access a virtualization host remotely in a secure fashion.
Learn More :
Cloud Infrastructure Chapter 7
- Which of these options is not a valid mechanism for improving disk performance?
- Which tool allows guest operating systems to share noncritical memory pages with the host?
- You need to divide your virtualized environment into groups that can be managed by separate groups of administrators. Which of these tools can you use?
- What do you need to employ if you have a serial device that needs to be utilized by a virtual machine?
- Which of the following must be licensed when running a virtualized infrastructure?
- In a scenario where an entity exceeds its defined quota but is granted access to the resources anyway, what must be in place?
- What mechanism allows one core to handle all requests from a specific thread on a specific processor core?
- How does the hypervisor enable access for virtual machines to the physical hardware resources on a host?
- When would a reservation be used?
- How are quotas defined?
- Quotas are a mechanism for enforcing what?
- Which of the following would be considered a host compute resource?
- An existing on-premises application will no longer be used in your company's public cloud implementation. Instead, a functional cloud equivalent will be used. To which aspect of the application life cycle does this apply?
- Andrew is working in a server room and needs to connect his laptop directly to a hypervisor for management purposes. What should he plug his laptop into?
- At which application life cycle phase is software performance tweaked?
- At which application life cycle phase are breakpoints removed by developers?
- Which of the following is an example of application life cycle management models?
- Which key is used to encrypt an SSH session?
- Which e-mail transfer protocol is commonly used to send notifications?
- What systems do cloud providers implement for rapid deployment of customer-requested services?
- You need to determine if future cloud network performance values are acceptable. What should you do first?
- You are using IPMI to remotely monitor a host whose operating system has crashed and is unresponsive. What type of items would you be monitoring?
- Which protocol does Microsoft System Center Configuration Manager (SCCM) use to gather hardware inventory?
- A national tax preparation firm tracks internal IT resource usage by department for billing purposes. What type of cloud is this?
- What is the desired end result of ITIL?