Ch 5 Flashcards
- You select the Manage tab for an ESXi host and select Storage from the toolbar. You then choose the Storage Adapters menu item, but the iSCSI Software Adapter is not listed. What could be the problem?
A. The software iSCSI adapter must be installed as a separate VIB.
B. The software iSCSI adapter is not enabled.
C. The software iSCSI adapter can be viewed only from the DCUI.
D. The software iSCSI adapter must have VMkernel networking set up before it is visible in the Storage Adapters list.
B. The software iSCSI adapter is not enabled by default.
- Which of the following is an example of a SCSI INQUIRY device identifier?
A. eui.5577bd49251ddb52
B. mpx.vmhba2:C0:T0:L0
C.vml.02000600006006016094602800364ce22e3
D. vmhba1:C0:T1:L0
A.Eui.5577bd49251ddb52 is an example of a SCSI INQUIRY device identifier.
3. ESXi 5.5 supports booting from an iSCSI SAN LUN with which of the following adapters? (Choose all that apply). A. Independent iSCSI HBA B. Dependent iSCSI hardware adapter C. Software iSCSI Adapter D. Fibre Channel HBA
A, B and C. ESXi 5.5 supports booting from an iSCSI SAN LUN with a supported iSCSI HBA, asupported dependent iSCSI hardware adapter, and the ESXi software iSCSI adapter.
- You create a new VMFS-5 datastore for one of your ESXi hosts. What is the largest VMDK file that can be created on this datastore?
A. 2 TB minus 512 bytes
B. 62TB
C. 64TB
D. None of these
D. This question cannot be definitively answered, because the version of the ESXi host is not specified. If it was an ESXi 5 or 5.1 host, then 2TB minus 512 bytes is correct. If ESXi 5.5 were used, then 62TB is the correct answer.
- Which of the following are default path selection policies in ESXi? (Choose all that apply.)
A. Fixed (VMware)
B. Dynamic (VMware)
C. Most Recently Used (VMware)
D. Round Robin (VMware)
A, C and D. The three path selection policies included by default in ESXi are Fixed, Most Recently Used, and Round Robin.
- You have a costomer that requires that the target (storage system) authenticates the iSCSI adapter (initiator) and that the iSCSI adapter also authenticates the target. Which CHAP authentication method should be used?
A. One-way CHAP
B. Mutual CHAP
C. Thre-way CHAP
D. None of these
B. With Mutual CHAP, the target (storage system) authenticates the iSCSI adapter (initiator), and the iSCSI adapter also authenticates the target. This authentication method is also known as bidirectional.
- You have a customer that is deploying ESXi and will be using iSCSI storage. The customer wants the iSCSI implementation to use the least amount of the ESXi host resources as possible. Which of the following storage adapters would be the best choice for this set of requirements?
A. Software iSCSI adapter
B. Dependent hardware iSCSI adapter
C. Independent hardware iSCSI adapter
D. FCoE adapter
C. Since the independent hardware iSCSI adapter handles the workload for both the iSCSI processing and the iSCSI traffic, it would place the least amount of additional load on the ESXi host resources.
- Your team has decided on new naming strategy for all VMFS datastores. Currently, the names used do not adhere to this standard. How can you most easily fix this problem?
A. Unmount the VMFS datastore and then rename it using the vSphere Web Client
B. Rename each VMFS datastore in the vSphere Web Client
C. Enable SSH and configure the firewall for the ESXi host using the vSphere Web Client, connect to it and then rename the VMFS datastore from the command line.
D. Storage vMotion a virtual machine and use the advanced options available there.
B. Renaming a VMFS datastore is a non-disruptive action. Simply renaming the datastore using the vSphere Web Client would be the easiest way to rename these datastores.
- Which of the following is a process performed at the SAN storage processors or ESXi host level that makes LUNs hidden from certain hosts?
A. Provisioning
B. Zoning
C. LUN masking
D. Multipathing
C. LUN masking is a process performed at the SAN storage processors or ESXi host level that makes LUNs hidden from certain hosts.
- What are two ways that VMFS datastores can be enlarged after their initial creation? (Choose two.)
A. Inflate
B. Extend
C. Expand
D. Zeroed
B and C. VMFS datastores can be extended or expanded to increase their size.
- Which of the following are vCenter Server storage filters? (Choose all that apply.)
A. VMFS filter
B. RDM filter
C. Same Host and Transports filter
D. Host Rescan filter
A, B, C and D. All four are correct and represent the four vCenter Server storage filters.
- You upgraded a VMFS-3 volume with a block size of 8MB to VMFS-5. What is the block size of the VMFS-5 volume?
A. 8MB
B. 4MB
C. 2MB
D. 1MB
A. VMFS-3 datastores will retain their original block size after an upgrade to VMFS-5.
- You need to unmounts a VMFS datastore from a cluster of ESXi hosts for maintenance. Which of the following are prerequisites for performing this action? (Choose all that apply.)
A. Virtual machines and templates may not reside on the datastore.
B. Mapping files for RDMs on the datastore must be removed.
C. ISOs located on the datastore must be removed from virtual machines.
D. The datastore must not be used for vSphere HA heartbeat.
A, B, C and D. All of these statemtnes are prerequisites for unmounting a VMFS datastore.
- Which of the following information is required when adding an NFS share to be used as a datastore? (Choose all that apply.)
A. NFS server name, IP address, or NFS UUID
B. Path to the NFS share
C. NFS server credentials
D. NFS datastore name
A, B and D. The NFS server’s name, the IP address or NFS UUID, the path to the NFS share, and the NFS datastore name to be used in vSphere are all required when adding an NFS datastore.
- You have a two node cluster of ESXi 5.5 hosts managed by vCenter 5.5. Your shared storage is supported Fibre Channel SAN, and you have a virtual machine that requires multiple 4 TB volumes for file storage. Which of the following can be used to provide the space for this file storage? (Choose all that apply.)
A. NFS
B. iSCSI
C. VMFS
D. RDM
C and D. A Fibre Channel SAN would allow you to use both VMFS and RDM to present these large volumes to the virtual machine.