Filters
Question type

Study Flashcards

You are using a network attached storage (NAS) system for virtual machine storage. What protocol can you use with VMware ESXi to access the files on the NAS?


A) AFP
B) NFSv3
C) CIFS
D) SMB

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

What does the VMware Transparent Page Sharing (TPS) feature do?

Correct Answer

verifed

verified

The VMware Transparent Page Sharing (TPS...

View Answer

Both vSphere 6.0 and Hyper-V provide checkpoint merge capability which allows a snapshot to be applied to a running VM without the need to shut down and restart.

A) True
B) False

Correct Answer

verifed

verified

What VMware technology is used by VMware FT to keep the secondary virtual machine up to date with the active primary virtual machine?


A) VMware vMotion
B) VMware vLockstep
C) VMware VMFS
D) VMware vSync

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

What sort of network policy should you utilize in vSphere if your intent is to limit the amount of bandwidth a virtual machine is allowed to use?


A) network security policy
B) network NIC teaming policy
C) network flow policy
D) network traffic shaping policy

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What statement reflects a valid approach to improving performance and security on a virtual server that accesses shared storage over the network, in addition to providing networking services?


A) The host should be placed in a special VLAN along with the storage to isolate access.
B) The host should be configured to use the same virtual network switch for both accessing shared storage and providing services.
C) The host should be configured to use the same network interfaces in a bonded group to access storage as well as provide network services.
D) The host should be configured to use separate network adapters for accessing storage and providing services.

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Match each item with a statement below.

Premises
A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
A method of gaining access to the underlying host through flaws in the hypervisor.
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Used to determine the MAC address associated with an IP address within the sender's network.
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
A common open source protocol used to communicate between switches and a management server.
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.
Responses
distributed switch
software-defined network (SDN)
Address Resolution Protocol (ARP)
directory traversal attacks
VLAN
scanning phase
OpenFlow
internal virtual switch
Non-Uniform Memory Access (NUMA)
reconnaissance phase

Correct Answer

A way of segmenting a network logically such that ports on a switch can be divided into logical groupings and act as a separate logical network.
A way of managing the flow of data across complex switched network environments that can include both physical and virtual switches.
A method of gaining access to the underlying host through flaws in the hypervisor.
A virtual switch similar to a Private Virtual Network in that it isn't bound to any physical NIC.
Used to determine the MAC address associated with an IP address within the sender's network.
A memory management protocol used in multiprocessing environments, allowing for a CPU to access local memory faster than memory that is shared with other processors.
Occurs when an attacker searches for information about the target using publicly available sources such as Web sites or Facebook pages.
A virtual switch that can be accessed from VMs running on any host managed by vCenter Server.
A common open source protocol used to communicate between switches and a management server.
Occurs when a hacker uses tools such as Network Mapper (NMAP) to look for open network ports and other vulnerable aspects of a system or applications.

What are the benefits of utilizing Virtual LANs to divide a network?

Correct Answer

verifed

verified

Using VLANs provide the following benefi...

View Answer

What hypervisor does NOT include a DHCP service for use with virtual machines?


A) VMware Workstation
B) VirtualBox
C) VMware vSphere
D) VMware Fusion

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

What statement regarding the use of iSCSI networks is not accurate?


A) Entities on an iSCSI network are referred to as nodes.
B) Each target must have an iSCSI qualified Name (IQN) or Extended Unique Identifier.
C) The iSCSI target is a single physical disk that is assigned a LUN.
D) LUNs are connected to a TCP/IP network using one or more Storage Processors.

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

How does the use of storage tiering affect the performance of virtual machines?

Correct Answer

verifed

verified

Storage tiering is an example of a data center storage technology that can further increase performance by dividing storage devices into tiers based on access speed. A virtual machine manager can then dynamically move VMs that require a lot of disk I/O to higher speed storage tiers running on fast devices such as SSD drives.

What VMware vSphere technology allows you to move not only a running virtual machine to a different vSphere host, but also the files associated with the virtual machines to a different data store?


A) vMotion
B) Storage vMotion
C) VMware FT
D) VMware DRS

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What statement regarding the use of an IDS is not accurate?


A) An IDS examines all packets on a virtual network.
B) An IDS can detect a denial of service attack.
C) An IDS can detect a virtual machine that is infected by a worm.
D) An IDS improves performance of a virtual network.

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

D

What are frames, and how are MAC addresses used to receive a frame on the network?

Correct Answer

verifed

verified

Both physical and virtual network adapters transfer data between network computers in packets of data bits called frames. In addition to data, frames include a Media Access Control (MAC address used to identify the sender and receiver. Network adapters receive frames by "listening" to network transmissions and checking each frame's MAC address. When a network adapter "sees" a frame with its MAC address, it transfers data bits from that frame into memory and then notifies the OS that the frame has been received. The OS then transfers data from the network adapter to an application, based on the information in the frame.

You are attempting to move a vSphere virtual machine stored in a VMFS formatted iSCSI volume to a workstation running VMware Workstation 12 Pro. What must be done to the VM before it can be moved?


A) Nothing, the virtual machine utilizes the .vmdk format and is ready to be moved.
B) The virtual disk must be converted to a .vmdk file prior to it being moved from the volume.
C) The iSCSI target must be mapped by the workstation, and then VMware Workstation 12 Pro must be used to convert the VM to a local data store location.
D) The VM must be moved out of the iSCSI data store on the vSphere host, and then exported to an OVF formatted virtual application.

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

What statement regarding the use of IPv4 is accurate?


A) IPv4 utilizes a 48-bit address to communicate on the network.
B) IPv4 utilizes a 128-bit address to communicate on the network.
C) The 127.0.0.1 address is reserved as a loopback address.
D) The subnet mask is used to determine what networks are public and what networks are private.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What VMware feature utilizes a second copy of a running VM that runs on a second vSphere host and is updated in real time, so that transfer can occur immediately to the second VM if the first should go offline?


A) VMware AlwaysOn
B) VMware vCluster
C) VMware vMotion
D) VMware FT

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

What is the VMware file system (VMFS), and what advantages does it provide over the use of traditional file systems?

Correct Answer

verifed

verified

VMware uses a file system called VMFS to...

View Answer

The reconnaissance phase of an attack occurs from outside of the network.

A) True
B) False

Correct Answer

verifed

verified

How is the iSCSI connection process typically made secure?


A) The Challenge Handshake Authentication Protocol is used to create a secure connection by encrypting the logon using a secret key.
B) The Password Authentication Protocol is used to pass authentication data, after which the connection is secured by symmetric encryption.
C) The RADIUS authentication protocol is utilized to log in to a RADIUS server that authenticates both parties, after which encryption is enabled.
D) The Kerberos protocol is used to facilitate the use of LDAP logins for authentication to the iSCSI target, after which the communication is secured via IPsec.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Showing 1 - 20 of 41

Related Exams

Show Answer