You are on page 1of 8

Your network contains an Active Directory domain.

The domain contains two


servers named Server1 and Server2. All servers run Windows Server 2008 R2 and
have Windows Firewall turned on. You need to ensure that you can use Event
Viewer on Server2 to access the Application log on Server1. What should you
do
a) On Server2, create a new event subscription
b) On Server2, modify the outbound firewall rules
c) On Server1, modify the inbound firewall rules
Your network contains a Windows Server Update Services (WSUS) server named
Server1. You need to configure all WSUS client computers to download approved
updates directly from the Microsoft Update servers. The solution must ensure
that all WSUS client computers report successful installation of updates to
Server1. What should you do
a) From Active Directory, deploy a Group Policy object (GPO
b) From Server1, modify the Update Source and Proxy options
c) From the WSUS client computers, modify the local computer policy
d) From Server1, modify the Update Files and Languages options
Your network contains a Web server that runs Windows Server 2008 R2. The Web
server has the Client Certificate Mapping Authentication role service
installed. You create a Web site that requires client certificates for
authentication. You need to enable client certificate mapping for the Web
site. Which tool should you use
a) Appcmd
b) Certutil
c) the Authorization Manager snap-in
You have a server that runs Windows Server 2008 R2. You create a new quota
template. You apply quotas to 100 folders by using the quota template. You
need to modify the quota settings for all 100 folders. You must achieve this
goal by using the minimum amount of administrative effort. What should you do
a) Modify the quota template
b) Delete and recreate the quota template
c) Create a new quota template. Modify the quota for each folder
d) Create a file screen template. Apply the file screen template to the root
of the volume that contains the folders
You have a DHCP server that runs Windows Server 2008 R2. You need to reduce
the size of the DHCP database. What should you do
a) From the DHCP snap-in, reconcile the database
b) From the folder that contains the DHCP database, run jetpack.exe dhcp.mdb
temp.mdb
c) From the properties of the dhcp.mdb file, enable the File is ready for
archiving attribute
d) From the properties of the dhcp.mdb file, enable the Compress contents to
save disk space attribute
You manage a domain controller that runs Windows Server 2008 R2 and the DNS
Server  role. The DNS server hosts an Active Directory-integrated zone
for your domain. You need to provide a user with the ability to manage
records in the zone. The user must not be able to modify the DNS server
settings. What should you do
a) Add the user to the DNSUpdateProxy Global security group

b) Add the user to the DNSAdmins Domain Local security group


c) Grant the user permissions on the DNS server
d) Grant the user permissions on the zone
Your network contains a computer named Computer1. Computer1 is assigned an IP
address of 192.168.1.112/26. Your company's corporate policy states that the
first usable address in each subnet is allocated to the default gateway. You
need to configure the default gateway for Computer1. Which address should you
choose
a) 192.168.1.1
b) 192.168.1.63
c) 192.168.1.65
d) 192.168.1.93
Your network contains two servers named Server1 and Server2 that run Windows
Server 2008. Microsoft System Center Operations Manager (SCOM) 2007 is
installed on Server2. The Hyper-V role is installed on Server1. Server1 hosts
five child virtual machines that run Windows Server 2003. You need to
recommend a solution that enables administrators to monitor the child virtual
machines. The solution must gather the following data from the virtual
machines: Performance statistics Event data from the application log What
should you recommend
a) On Server1, install a SCOM agent
b) On each child virtual machine, install a SCOM agent
c) On Server2, install the Microsoft Virtual Server 2005 R2 Management Pack
d) On Server2, install Microsoft System Center Virtual Machine Manager
(SCVMM) 2007
You have a Windows Server 2008 Enterprise Root CA. Security policy prevents
port 443 and port 80 from being opened on domain controllers and on the
issuing CA. You needto allow users to request certificates from a Web
interface. You install the AD CS role. What should you do next
a) Configure the Online Responder Role Service on a member server
b) Configure the Online Responder Role Service on a domain controller
c) Configure the Certification Authority Web Enrollment Role Service on a
member server
d) Configure the Certification Authority Web Enrollment Role Service on a
domain controller
You network contains one Active Directory domain. All domain controllers run
Windows Server 2008. The network has 100 servers and 5,000 client computers.
Client computers run either Windows XP Service Pack 2 (SP2) or Windows Vista
Service Pack 1 (SP1). You need to plan the deployment of Certificate Services
on the network to support the following requirements: Automatic certificate
enrollment Supported certificates for all client computers. What should you
include in your plan
a) Deploy a stand-alone certification authority (CA). Create V2 templates
b) Deploy a stand-alone certification authority (CA). Create V3 templates
c) Deploy an enterprise certification authority (CA). Create V2 templates
d) Deploy an enterprise certification authority (CA). Create V3 templates

In
at
a)
b)
c)
d)

order to upgrade to vSphere 4, an ESXi host must have a /boot partition of


least
100MB
50MB
150MB
200MB

Assuming VLANs are not configured, which of the following is true about
traffic from a virtual machine connected to a port group on a vNetwork
Standard Switch with no uplinks
a) Virtual machines on any virtual switch on the same ESXi Server can receive
the traffic
b) The virtual switch will drop the packets if no uplink is present
c) Only virtual machines in the same port group on the virtual switch can
receive the traffic
d) Virtual machines in any port group on the virtual switch can receive the
traffic
If you are planning on installing the Cisco Nexus 1000v Distributed Switch on
your<BR>vSphere cluster, which Licensing package would you need to purchase
a) Advanced
b) Enterprise
c) Enterprise Plus
d) Standard
Which resource management technique can be used to relieve a network
bottleneck caused by a virtual machine with occasional high outbound network
activity
a) Convert the switch from a vSphere Standard Switch to a vSphere Distributed
Switch
b) Create a new portgroup for the virtual machine and enable traffic shaping
c) Apply traffic shaping to the other virtual machines in the same port group
d) Apply traffic shaping to the virtual machine with high activity
What is the default size for the / (root) partition
a) 5GB
b) 2GB
c) 7GB
d) 2TB
An administrator is working to implement Storage Profiles in their
environment. How he can generate the storage capabilities
a) They are generated by Datastore Clusters as LUNs are added to the cluster
b) They are automatically determined by the Storage Profile when it is
created
c) They can be manually generated by the administrator
d) It cannot be generated and need to get it from vendor
Securing an ESXi service console is important because
a) VMs depend on the patch level of the service console
b) Service Console actions can affect all VMs on an ESXi host
c) Service Console permissions are applied to users when logging in to a host
via vCenter
d) VMs run in the service console

It is a best practice to create a non-privileged user acount for each ESX


Server user. What is the reason for this practice
a) This enables users to have access to the public network only
b) This creates a reliable audit trial of users logging onto the ESX Server
c) This prevents ESX users from logging into privileged virtual machines
d) This allows users to remotely login to the ESX Server using a secure shell
Additional licensing is required once the number of cores per CPU reaches
which of the following
a) 8 or more cores
b) 12 or more cores
c) 6 or more cores
d) 24 or more cores
You have decided to install VirtualCenter on an existing Windows Server
running an<BR>application that is accessed through standard HTTP and HTTPS
connections, ports 80 and 443.<BR>What will you need to do in order to
successfully deploy VirtualCenter
a) No additional action is required
b) You must specify alternate VirtualCenter Web Service ports during
installation and manually specify the alternate ports when connecting with
the Virtual Infrastructure Client
c) You must move the application to another server but keep IIS installed and
running on ports 80 and 443 for use with SDK clients
d) You must change the VirtualCenter Web Service port to 905 if SDK clients
will be used
While performing a clean installation of an ESXi Server, the following
partitions were<BR>created using the advanced partitioning option:<BR>/boot =
110 MB<BR>swap = 600 MB<BR>/home = 2000 MB<BR>/vmimages = 10000
MB<BR>/var/log = 1500 MB<BR>VMFS = use all available free space<BR>You
receive an error message and cannot continue. What is causing the error
a) ESX 3.x no longer requires a swap partition
b) /home needs to reside on the SAN
c) The /boot partition is too small
d) The / partition is missing
What is the maximum number of Virtual Machines supported per host in Vsphere
4
a) 319
b) 320
c) 321
d) 520
Which memory conservation technique allows the secure elimination of
redundant copies of memory pages between virtual machines on the host
a) Memory Balloon Driver
b) VMkernel Swap
c) RAM Overcommit
d) Transparent Page Sharing
What is the function of vmmemctl driver
a) enables swapping of the virtual machines
b) allows the operation of unsupported guest OS types
c) enables transparent page sharing
d) reclaims unused memory from the guest OS

What is the size of the esxconsole.vmdk


a) 1200MB
b) 800MB
c) 1000MB
d) 2000MB
An administrator has created a virtual machine that will be accessed from a
public kiosk. Management has requested that the virtual machine should be
reset to a known state once a week or on demand if requested. Which method is
the simplest way to meet this requirement
a) Configure the storage array to be vSphere aware and script routine array
snapshot restore of the datastore
b) Implement a third party imaging server and PXE boot the virtual machine
off a static image
c) Set the VMDKs of virtual machines to be independent-Nonpersistent and
schedule restart of virtual machine
d) Create non-persistent disks for virtual machine and set the guest OS to
reboot once a week
What is true about VSWP file
a) VSWP file is equal to memory allocation
b) VSWP file size is equal to the difference between memory assigned and
memory reservation
c) VSWP file size is equal to the page file size of guest OS
d) VSWP file size is equal to the memory reservation
Swap, var/log and all the other optional partitions are stored where
a) In a Virtual disk called esxconsole-/esxconsole.vmdk
b) On a Physical disk called esxconsole-/esxconsole.vmdk
c) Physical disk
d) Virtual disk
What is the maximum number of ESX/ESXi Hosts that can be managed with vCenter
Foundation
a) 1
b) 4
c) 2
d) 3
A Windows virtual machine (VM) viewed through Task Manager shows CPU
utilization averaging 90-100%. What does this indicate
a) The VM CPU reservation is not sufficient
b) The VM has an impending performance problem. The running processes in
Windows Task Manager should be checked to determine what applications are
consuming CPU resources
c) The VM has CPU affinity set to CPU 0 and is competing with the service
console for CPU resources. Esxtop should be run to confirm the diagnosis
d) The VM is utilizing most of the CPU resources allocated to it. The CPU
Ready value should be checked to determine if this a resource constraint

A company has converted several physical machines to virtual machines but are
seeing significant Performance issues on the converted machines. The host is
configured with sufficient memory and Storage does not appear to be a
bottleneck. Which metric can be checked to determine if CPU contention exists
on an ESXi 5.x host
a) %RUN
b) %WAIT
c) %USED
d) %RDY
Distributed Power Management (DPM) requires which technology to be available
on the NIC
a) WOL
b) NetBIOS
c) BMC
d) DNS
Which ONE of the following is a key feature of VMware High Availability
services
a) HA can automatically restart Virtual Machines from a failed ESXi server
b) HA can VMotion Virtual Machines to surviving ESXi servers
c) HA can take the place of other cluster software, like Microsoft Cluster
Services (MSCS
d) HA can automatically restart failed ESXi Servers
Which of the following is the technology used by Vmware Fault Tolerance
a) Vmware vLockstep
b) Vmware vSafe
c) Vmware vCluster
d) Vmware vShield
Which of the following vSphere features is supported for fault tolerant
virtual machines
a) Backup of VM using VMware Data Recovery
b) Storage vMotion
c) vSphere Distributed Resource Scheduler
d) Virtual Machine snapshot
What is LDAP
a) Lightweight Directory Access Protocol LDAP is the Application of Window to
manage Active Directory
b) Lightweight Directory Access Protocol LDAP is the industry standard
software
c) Lightweight Directory Access Protocol LDAP is the industry standard
directory access protocol
Which malicious software can be transmitted across computer networks without
user intervention
a) A worm can be transmitted without user intervention
b) A virus can be transmitted without user intervention
c) A logic bomb can be transmitted without user intervention
d) A Trojan horse can be transmitted without user intervention

What is the Citrix 6.5 client software called


a) Citrix Agent
b) Citrix Receiver
c) Presentation Server Client
d) Citrix Client
In Windows environments, system state backups have a shelf life. For domain
controllers, what is the shelf life or tombstone age by default
a) 30 days
b) 90 days
c) 60 days
d) 120 days
What happens to a running Cluster if the quorum disk fails in Windows Server
2008 Cluster
a) Cluster resources fail to be accessible
b) No impact at all
c) Cluster continue to work but failover will not happen in case of any other
failure in the active node
d) Automatically the resources will be distributed among the nodes
AutoDiscover service is part of which server role
a) Client Access
b) Mailbox
c) Hubtransport
d) EdgeServer
Your network contains a two node Hyper-V cluster that hosts 10 virtual
machines (VMs). You discover that when a failover occurs, all of the VMs fail
over simultaneously. You need to modify the cluster so that you can fail over
each VM individually. What should you do first
a) Add a third node to the cluster
b) Add a new disk to the failover cluster
c) Create a Clustered Shared Volume
d) Modify the properties of the cluster failover
Maximum Powered-on virtual machines per vCenter5 Server
a) 2500
b) 5000
c) 10000
d) 1024
Security related patches that are released on days other than Patch Tuesday
are referred to as&nbsp;
a) Non-critical
b) out-of-band
c) Out of series
d) Non MS patches

After a successful P2V (physical to virtual) conversion of a Windows-based


system using VMware Converter, the resulting virtual machine is giving blank
screen after POST. The logs do not contain any errors or messages that
indicate a problem with VMware Converter or ESX. What may be the possible
cause of the issue
a) The Volume shadow copy service not started on source machine
b) There is no free space on volumes
c) Remove /burnmemory from boot.ini
d) Remove /3gb Switch from boot.ini
Accordingly to ITIL, are Knowledge Management Database and Known Error
Database one and the same
a) Yes, they are
b) No, they are not
An
a)
b)
c)
d)

incident can be reopened


never
always
subject to the re-open rules agreed with customer
only at the discretion of the service desk/ incident manager

Functional escalation' of an incident is required to


a) engage higher technical expertise for resolution</span></label></td>
b) engage senior management
c) engage different functions
d) engage the head of any function
Incidents may be detected and reported by event monitoring tools
a) TRUE
b) FALSE
Software installation request is not an example of an Incident
a) TRUE
b) FALSE

You might also like