Professional Documents
Culture Documents
In
at
a)
b)
c)
d)
Assuming VLANs are not configured, which of the following is true about
traffic from a virtual machine connected to a port group on a vNetwork
Standard Switch with no uplinks
a) Virtual machines on any virtual switch on the same ESXi Server can receive
the traffic
b) The virtual switch will drop the packets if no uplink is present
c) Only virtual machines in the same port group on the virtual switch can
receive the traffic
d) Virtual machines in any port group on the virtual switch can receive the
traffic
If you are planning on installing the Cisco Nexus 1000v Distributed Switch on
your<BR>vSphere cluster, which Licensing package would you need to purchase
a) Advanced
b) Enterprise
c) Enterprise Plus
d) Standard
Which resource management technique can be used to relieve a network
bottleneck caused by a virtual machine with occasional high outbound network
activity
a) Convert the switch from a vSphere Standard Switch to a vSphere Distributed
Switch
b) Create a new portgroup for the virtual machine and enable traffic shaping
c) Apply traffic shaping to the other virtual machines in the same port group
d) Apply traffic shaping to the virtual machine with high activity
What is the default size for the / (root) partition
a) 5GB
b) 2GB
c) 7GB
d) 2TB
An administrator is working to implement Storage Profiles in their
environment. How he can generate the storage capabilities
a) They are generated by Datastore Clusters as LUNs are added to the cluster
b) They are automatically determined by the Storage Profile when it is
created
c) They can be manually generated by the administrator
d) It cannot be generated and need to get it from vendor
Securing an ESXi service console is important because
a) VMs depend on the patch level of the service console
b) Service Console actions can affect all VMs on an ESXi host
c) Service Console permissions are applied to users when logging in to a host
via vCenter
d) VMs run in the service console
A company has converted several physical machines to virtual machines but are
seeing significant Performance issues on the converted machines. The host is
configured with sufficient memory and Storage does not appear to be a
bottleneck. Which metric can be checked to determine if CPU contention exists
on an ESXi 5.x host
a) %RUN
b) %WAIT
c) %USED
d) %RDY
Distributed Power Management (DPM) requires which technology to be available
on the NIC
a) WOL
b) NetBIOS
c) BMC
d) DNS
Which ONE of the following is a key feature of VMware High Availability
services
a) HA can automatically restart Virtual Machines from a failed ESXi server
b) HA can VMotion Virtual Machines to surviving ESXi servers
c) HA can take the place of other cluster software, like Microsoft Cluster
Services (MSCS
d) HA can automatically restart failed ESXi Servers
Which of the following is the technology used by Vmware Fault Tolerance
a) Vmware vLockstep
b) Vmware vSafe
c) Vmware vCluster
d) Vmware vShield
Which of the following vSphere features is supported for fault tolerant
virtual machines
a) Backup of VM using VMware Data Recovery
b) Storage vMotion
c) vSphere Distributed Resource Scheduler
d) Virtual Machine snapshot
What is LDAP
a) Lightweight Directory Access Protocol LDAP is the Application of Window to
manage Active Directory
b) Lightweight Directory Access Protocol LDAP is the industry standard
software
c) Lightweight Directory Access Protocol LDAP is the industry standard
directory access protocol
Which malicious software can be transmitted across computer networks without
user intervention
a) A worm can be transmitted without user intervention
b) A virus can be transmitted without user intervention
c) A logic bomb can be transmitted without user intervention
d) A Trojan horse can be transmitted without user intervention