A) AFP
B) NFSv3
C) CIFS
D) SMB
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) VMware vMotion
B) VMware vLockstep
C) VMware VMFS
D) VMware vSync
Correct Answer
verified
Multiple Choice
A) network security policy
B) network NIC teaming policy
C) network flow policy
D) network traffic shaping policy
Correct Answer
verified
Multiple Choice
A) The host should be placed in a special VLAN along with the storage to isolate access.
B) The host should be configured to use the same virtual network switch for both accessing shared storage and providing services.
C) The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services.
D) The host should be configured to use separate network adapters for accessing storage and providing services.
Correct Answer
verified
Matching
Correct Answer
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) VMware Workstation
B) VirtualBox
C) VMware vSphere
D) VMware Fusion
Correct Answer
verified
Multiple Choice
A) Entities on an iSCSI network are referred to as nodes.
B) Each target must have an iSCSI qualified Name (IQN) or Extended Unique Identifier.
C) The iSCSI target is a single physical disk that is assigned a LUN.
D) LUNs are connected to a TCP/IP network using one or more Storage Processors.
Correct Answer
verified
Essay
Correct Answer
verified
Multiple Choice
A) vMotion
B) Storage vMotion
C) VMware FT
D) VMware DRS
Correct Answer
verified
Multiple Choice
A) An IDS examines all packets on a virtual network.
B) An IDS can detect a denial of service attack.
C) An IDS can detect a virtual machine that is infected by a worm.
D) An IDS improves performance of a virtual network.
Correct Answer
verified
Essay
Correct Answer
verified
Multiple Choice
A) Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved.
B) The virtual disk must be converted to a .vmdk file prior to it being moved from the volume.
C) The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location.
D) The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application.
Correct Answer
verified
Multiple Choice
A) IPv4 utilizes a 48-bit address to communicate on the network.
B) IPv4 utilizes a 128-bit address to communicate on the network.
C) The 127.0.0.1 address is reserved as a loopback address.
D) The subnet mask is used to determine what networks are public and what networks are private.
Correct Answer
verified
Multiple Choice
A) VMware AlwaysOn
B) VMware vCluster
C) VMware vMotion
D) VMware FT
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B) The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C) The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D) The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.
Correct Answer
verified
Showing 1 - 20 of 41
Related Exams