Terms in this set (168)A more modern name for a Virtual Machine Manager (VMM) is a _________________. hypervisor Companies use virtualization to do all of the following except: Reduce the amount of applications in corporate datacenters T/F False What two information technology trends helped drive the need for virtualization? The explosive growth of Microsoft Windows on servers in corporate datacenters. The constantly increasing capabilities of corporate servers due to Moore's Law. A Terabyte is equivalent to ___________ Gigabytes. 1024 T/F False
T/F True T/F False According to Popek and Goldberg, a VMM needs to exhibit three
properties in order to be considered an efficeint VMM Virtualization was developed and used on computers during which decade? 1960's _______________ is when companies use virtualization to deploy all new applications as virtual machines. Containment The _____________________ is the measure of how servers are condensed as a result of virtualization. (Two words.) consolidation ratio Which of the following is not one of Popek and Goldberg's properties that a VMM would need to exhibit in order to be considered efficient? Persistence According to Popek and Goldberg, a VMM needs to exhibit three
properties in order to be considered an efficeint VMM The _________ hypervisor is an example of an open-source project. Xen A virtual machine can: Can only see resources allocated by the hypervisor T/F False The hypervisor handles all of the storage I/O requests from the guest the network I/O, memory processing, and CPU work. T/F False A hypervisor is a specialized SOFTWARE device
that facilitates virtualization Guest or VM is another term for ______________. virtual machine VMM stands for the term ________. Virtual Machine Manager T/F True The first commercial x86 hypervisor was released by: VMware Another name for a virtualization server is a: Host A _____________ hypervisor runs directly on the server hardware to provide resources to the virtual machines it supports. Type 1 T/F False A ____________ hypervisor runs on top of an operating system to provide resources to the virtual machines it supports. Type 2 T/F True A ______________ is a specialized VM that contain an operating system and is preloaded and pre-configured with an application. virtual appliance The least privileged Ring in the x86 Processor architecture is Ring: 3 A new virtual machine created by copying an existing virtual machine is called a _____________. clone T/F False Once that copy exists, the guest operating system only needs some customization in the form of unique system information, such as system name and IP address, before it can be instantiated. Without those changes, two VMs with the same identity would be running the network and application space, and that would wreak havoc on many levels. T/F False VM-to-VM communications can occur across a virtual switch and nvever leave the physical host. When a virtual machine's operating system issues a shutdown command, what happens? The hypervisor traps the command and tells the virtual machine the virtual hardware is shutting down. _____________ allow a user to return a virtual machine to prior state in time. Snapshots NFS, fibre channel, and iSCSI are all examples of ___________ connection types. storage T/F False OVF Open Virtualization Format is a standard that provides a platform and vendor-neutral format to bundle and deploy virtual machines. x86 processor architecture provides four different levels of command execution to provide security. These levels are often referred to as ____________. rings A virtual machine that is created expressly for the purpose of being a standardized mold to create new VMs is called a: Template T/F False Hot cloning performs the clone operation while the source server is booted and the application is running. A hot clone allows the P2V to complete without disrupting the application. The New Virtual Machine Wizard of VMware Player allows you to install an operating system from: (Choose all that apply.) CD/DVD drive T/F True T/F False Which of the following is not a process when dealing with virtual infrastructures: P2P Most virtual servers are often configured with ____________ memory and processor resources than their physical counterparts. less The practice is to start smaller with an initial VM and add resources if necessary, rather than start with a larger VM and subtract them. VMware Player is an example of a ___________ hypervisor. Type 2 One way that virtual servers are sized differently than physical servers is that: They do not need to be sized for long term growth when they are first deployed The elapsed time for a P2V process to complete is directly related to: the number and size of disks that need to be processed A server is expected to process 2000 transactions per second during its initial year of deployment. If it is expected to increase transaction growth by 10% annually, how many transactions per second should the server be able to process by the end of its fifth year? 2928 T/F False The practice is to start smaller with an initial VM and add resources if necessary, rather than start with a larger VM and subtract them. ______________ is when you perform a P2V process on a physical server that is still running and the application is servicing users. Hot cloning _____________________ should be collected from both physical and virtual servers in order to understand and monitor the resources being consumed by the workload. Performance metrics The most time-consuming step during the Windows installation process is usually: Copying and unpacking files from the installation media to the disk storage Examples of services that would be disabled in a virtual machine are: (Choose more than one.) Wireless connectivity The Windows 7 installation type for a new installation of Windows is __________________. custom T/F True ________________ are virtual machines that already contain an operating system, are sometimes preloaded with application software, and are used to create new virtual machines. Templates In order to power on the virtual hardware to begin the installation, choose the ______________ option from the virtual machine menu. (Three words separated by a space.) Play Virtual Machine T/F False T/F False When loading an operating system into a virtual machine, that virtual machine: Must be powered on and have the installation media as the boot device VMware Tools are installed in a virtual machine for all except: Enhanced memory utilization T/F False T/F False When Linux partitioned the 20GB allocated for disk storage, how much was reserved for boot software? 500 MB Which of the following is not an example of a server operating system: VMware ESXi If you only had a physical DVD of the Red Hat Linux Installation media, you would choose ______________ as the connection type for the CD/DVD device in order to boot from the DVD when the virtual machine was powered on. use physical drive If you install the VMware Tools on a Linux system, the program that it runs as a system daemon is ______________. vmtoolsd The protocol that helps multiple servers keep their system time synchronized is: NTP Linux is considered to be a(n) ________________ operating system. open-source On Linux systems, a system process is also known as a(n) ________________. daemon T/F True T/F False When Linux partitioned the 20GB allocated for disk storage, how much was actually allocated for user space? 17.96 GB Linux operating systems should not be modified once the installation is complete. False Enabling Hyper-threading with usually improve performance by About 30% T/F False _______________ is an Intel technology that improves performance by allowing more than one set of instructions to be executed on a processor. Hyper-threading Best practice is to configure ___________ vCPU(s) for a new virtual machine. one A host server has 4 processors, each with 8 cores. If you can allocate 8 vCPUs per pCPU, how many vCPUs can be allocated? Each processor has eight cores. Each core (pCPU) can support eight vCPUs. 4 processors x 8 cores x 8 vCPUs = 256 vCPUs T/F True A virtual machines that is running on a host with an AMD processor can be live migrated to a host with an Intel processor. False In a mixed environment, the instruction sets of the different microprocessors are not identical, so you cannot live-migrate the virtual machines from an AMD host to an Intel host, or vice versa. ________________ is when multiple entities are all simultaneously trying to use the same resource causing performance to suffer. contention The maximum number of vCPUs that can be configured in a single virtual machine is: it varies by the hypervisor vendor Modern CPUs are often a package of multiple processors. These individual processors are also known as _________. cores One reason to create a virtual machine with multiple multi-core vCPUs is: In some cases, licensing allows operating systems to use more resources with the multi-core vCPUs T/F False T/F False Hypervisors manage the virtual machine's memory use of physical memory through the implementation of ____________. Memory mapping tables T/F False Memory blocks are also known as _________ pages T/F True Which if the following is not an example of memory optimization Dynamic Addition Dynamic addition of memory (hot-add) into a virtual machine depends on: If the guest operating system supports dynamic addition The process of copying memory blocks to disk storage is known as _____________. paging T/F False The ability to allocate more virtual memory than physically exists on a host server is called _______________. Memory Overcommit Which of the following does VMware Player not provide regarding memory management: Guest OS Recommended Maximum Memory value Memory, or RAM, is another term for: Random Access Memory T/F False ___________________ is when a file system consumes the entire allocated amount of space, whether or not it is ever used thick provisioning T/F True T/F False Storage virtualization is Abstracting of the resources to the virtual machines Virtualization hosts can use all of the following except: Virtual Network Storage arrays Virtual machines can bypass the hypervisor and connect directly to a physical device by using ___________. Raw device mapping (RDM) ____________________ is a storage technology that deals with how data is spread across multiple disks for both increased availability and improved performance. RAID Deduplication technology can work with all of the following data entities except: File systems T/F False One of the primary reasons for poor performance in a virtual environment is due to: Lack of adequate storage IO throughput _________________ is a storage capability that removes duplicate chunks of data and replaces them with pointers back to a single original item. Deduplication In a bridged network configuration: Virtual machines have IP addresses that are unique to the network and can be seen from outside of the host T/F False _____________ is used to automatically provide IP addresses for both physical and virtual servers. Dynamic Host Configuration Protocol (DHCP) In a NAT network configuration: Virtual machines have unique IP addresses but cannot be seen from outside of the host An IPv4 address is represented as ________ octets in the dot and decimal format. 4 VMware Workstation can be used to configure all of the following network connections except: Transparent T/F True Virtual machines can communicate only with other virtual machine across a(n) ___________________. Internal virtual switch T/F True Converged Network Adapters: Reduce the number of NICs in a server and by consolidating traffic types across larger bandwidth A virtual machine connects from the virtual NIC to a(n) _____________. virtual switch T/F False Cloned virtual machines can be used for all except: The restoration of a previous machine state T/F True Virtual machines that are not powered on and are used to create new virtual machines are known as: Templates
T/F False T/F True When using snapshots, you can incorporate changes made into the base virtual machine by ______________. merging snapshots A full clone requires ______________ disk space that the original virtual machine consumes. the same amount of In a VMware environment, a .vmdk file represents a virtual machine's ________________. virtual disk _____________ is a Microsoft specific utility that is used to automate the customization of a Windows server. Sysprep Virtual machines can be altered, and if those changes prove to cause problems, the virtual machine can be reverted to the original state through the use of: Snapshots T/F False Cloned virtual machines: All of the above Virtual machine tools are installed as all of the following except: User application _______________ are normally no longer found on computers, but were once the most popular media for moving data from system to system. Floppy disks T/F True T/F False Virtualizing a sound card is somewhat of a misrepresentation because: Control is passed to the sound card on the local device, not the host server Virtual machine tools are installed to provide: (choose all that apply) Improved performance T/F True Mice, keyboards, and graphical displays are all examples of _________. Human Interface Devices (HIDs) T/F False The _______________ offers a common connection for computer peripherals and provides data transfer and power capabilities for those devices. Universal Serial Bus (USB) standard Virtual Machines can support all of the following USB devices except: They can all be supported While physical floppy disks had a write-protect tab to guard against accidental data alteration or erasure, to achieve the same effect for a virtual floppy disk the ____________ option would need to be selected. Read-only A mission critical virtual machine can be protected from a virtualization host failure by utilizing: Fault tolerance Files that compose virtual machines can be move from one place to another without interrupting the virtual machine through the use of ___________________. Storage Migration ____________________ groups network adapters together for higher throughput and availability if one adapter in the group fails. NIC teaming T/F False T/F True Virtual machines can be protected in the event of a data center interruption by utilizing: Disaster recovery solutions T/F False ________________ links together two or more servers with networking and shared storage to provide an environment to enable greater uptime. Clustering ___________________ describes a condition where a virtual environment has deployed many servers without the benefit of adequate business processes and that environment is now overwhelmed. Server sprawl T/F True Availability solutions that translate from the physical environment to the virtual environment include all but the following: Live migration 'Five nines' equates to how much downtime in a year? 5 minutes and 18 seconds In a three-tier architecture, the component that runs the program code and enforces the business processes is the: Application Server ___________________ rules guarantee that two selected virtual machines will not run on the same virtualization host. Anti-affinity T/F True
The preferred way to ensure that an application performs correctly is to: Measure performance regularly and adjust resources if necessary Virtual appliances are often delivered in _____________ format so they can be quickly deployed on any hypervisor. Open virtualization format (OVF) T/F True ___________________ are aggregated collections of memory and CPU resources that can be shared among groups of virtual machines or other entities. Resource pools ____________________ is a package of one or more virtual machines that make up an entire deployable application. vApp In a three-tier architecture, the component that acts as the interface between the user and the application is the: Webserver Resource pools can be applied to all of the following except: Groups of clusters T/F False Shares are used to determine the guaranteed minimum amount of a resource allocated to a virtual machine. False Sets with similar termsVirtualization Midterm83 terms Tammyjo81 Unit 7 Quiz26 terms esleonard4 05 - Hypervisor11 terms shabaaz3000 Homework 335 terms Philip_Cogar Sets found in the same folderCCC Virtualization Chapters 8-1484 terms mgeverington Virtualization Chapter 111 terms mouseclick Virtualization Final60 terms Tammyjo81 CTI 140 Final69 terms canx Other sets by this creatorVCP-6.5-2V0-622203 terms Amanda_Joder VCP 6.513 terms Amanda_Joder Savannah sight words for Kids R Kids65 terms Amanda_Joder NetApp NCDA NSO-157 Study Questions8 terms Amanda_Joder Verified questions
COMPUTER SCIENCE Write a program that uses a structure to store the following data about a customer account: Name Address City, State, and ZIP Telephone Number Account Balance Date of Last Payment The program should use an array of at least 10 structures. It should let the user enter data into the array, change the contents of any element, and display all the data stored in the array. The program should have a menu-driven user interface. Verified answer COMPUTER SCIENCE T F Only one generic type may be used with a template. Verified answer
COMPUTER SCIENCE How does the compiler know whether an overloaded ++ operator should be used in prefix or postfix mode? Verified answer
COMPUTER SCIENCE A component that collects data from people or other devices and sends it to the computer is called __________. a. an output device b. an input device c. a secondary storage device d. main memory Verified answer Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions Operating System Concepts9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin 489 solutions Other Quizlet setsR and j act 4 and 519 terms cassidy_medina Exam 1 - CEE 802-121739 terms Sarah_Bray3 Types of Interactions36 terms ans_glove Related questionsQUESTION As a software developer, you need to create a variable to store postal codes. Which data type would you MOST likely user? 3 answers QUESTION A user reports to you that he accidentally deleted a Windows 7 library. He is worried that he has lost all the data in the library. What should you tell him? 3 answers QUESTION If the BOOTPROTO argument in a network configuration file is set to equal static, it is necessary to explicitly specify an IP address, A netmask, a network address, a broadcast address, and a gateway address. 2 answers QUESTION The most widely known code of conduct specifically for computer professionals is the 15 answers What happens when a server is virtualized with server virtualization?By having each physical server divided into multiple virtual servers, server virtualization allows each virtual server to act as a unique physical device. Each virtual server can run its own applications and operating system.
How does server virtualization make a data Centre more efficient Mcq?By decreasing server utilization rates.
What is server virtualization implementation?Server virtualization is the process of creating multiple server instances from one physical server. Each server instance represents an isolated virtual environment. Within each virtual environment, you can run a separate operating system.
What do u mean by server virtualization Mcq?Answer: A. Explanation: Virtualization is a kind of technique that allows us to share the single physical instance of a resource or application between several organizations/users.
|