CIS Test 2 Flashcards

1
Q

Created from a physical machine or cluster.

A

Resource Pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A logical abstraction of aggregated physical resources that are managed centrally.

A

Resource Pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must be done to resources in order to manage them centrally?

A

Resources must be POOLED to manage them centrally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goals of Resource Management

A

Controls utilization of resources. Prevents VMs from monopolizing resources. Allocates resources based on relative priority of VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process of allocating resources from physical machine or clustered physical machines to virtual machines (VMs) to optimize the utilization of resources.

A

Resource Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provides mouse, keyboard, and screen functionality.Sends power changes (on/off) to the virtual machine (VM).Allows access to BIOS of the VM.Typically used for virtual hardware configuration and troubleshooting issues.

A

Virtual Machine Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Makes a virtual machine portable across physical machines.

A

Standardized hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: All virtual machines have standardized hardware.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enables storing VM files on a remote file server (NAS device).Client built into hypervisor.

A

Network File System (NFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cluster file system that allows multiple physical machines to perform read/write on the same storage device concurrently.Deployed on Fiber Channel (FC) and iSCSI storage apart from local storage.

A

Virtual Machine File System (VMFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two file systems supported by hypervisors

A

Virtual Machine File System (VMFS) - Network File System (NFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VM File Set

A

Configuration file - Virtual disk files - Virtual BIOS file - Virtual machine swap file - Log file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual Machine from a hypervisor’s perspective

A

A discrete set of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Machine from a user’s perspective

A

A logical compute system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware Assisted Virtualization

A

Achieved by using hypervisor-aware CPU to handle privileged instructions. Reduces virtualization overhead due to full and paravirtualization. CPU and memory virtualization support is provided in hardware. Enabled by AMD-V and Intel VT technologies in the x86 processor architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Product examples that implement paravirtualization

A

XenKVM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Only possible in an open operating system environment

A

Paravirtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Not possible in closed source OSs such as Microsoft Windows.

A

Paravirtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Guest OS knows that is is virtualized.Guest OS runs in Ring 0.Modified guest OS kernel is used, such as Linux and OpenBSD.Unmodified guest OSs, such as Microsoft Windows, are NOT supported.

A

Paravirtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Product examples of hypervisors that implement the full virtualization technique

A

VMware ESX/ESXi - Microsoft Hyper-V (running in a server core environment, not as a Windows application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VMM runs in the privileged Ring 0.VMM decouples guest OS from the underlying physical hardware.Each VM is assigned a VMM.Guest OS is NOT aware of being virtualized.

A

Full Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Three techniques for handling privileged instructions to virtualize the CPU on x86 architectures

A

1) Full Virtualization using Binary Translation (BT) 2) Paravirtualization (OS-assisted Virtualization) 3) Hardware assisted Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Where most user applications run in x86 architecture

A

Ring 3 (least privileged)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where OS runs in x86 architecture

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Most privileged ring in x86 architecture

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Four levels of privilege of the x86 architecture

A

Ring 0 - Ring 1 - Ring 2 - Ring 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How is a traditional or typical OS designed?

A

To run on a bare-metal hardware platform and to fully own that hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Challenges of virtualizing x86 hardware

A

Requires placing the virtualization layer below the OS layer. Is difficult to capture and translate privileged OS instructions at runtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Benefits of Compute Virtualization

A

Server Consolidation - Isolation - Encapsulation - Hardware Independence - Reduced Cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Type of hypervisor most predominantly used within the Virtualized Data Center (VDC)

A

Type 1 Bare-Metal Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Primary component of virtualization that enables compute system partitioning (i.e., partitioning of CPU and memory).

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Type of hypervisor installed and run as an application on top of an OS.Supports broadest range of hardware configurations.

A

Type 2 Hosted Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Type of hypervisor that is directly installed on the x86 based hardware.Has direct access to the hardware resources.

A

Type 1 Bare-metal hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Two types of hypervisors

A

Type 1: Bare-metal hypervisor Type 2: Hosted hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What happens when a VM starts running?

A

Control is transferred to the Virtual Machine Monitor (VMM), which subsequently begins executing instructions from the VM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Assigned to each VM and has a share of the CPU, memory, and I/O devices to successfully run the VM.

A

Virtual Machine Monitor (VMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Responsible for actually executing commands on the CPUs and performing Binary Translation.

A

Virtual Machine Monitor (VMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Abstracts hardware to appear as a physical machine with its own CPU, memory, and I/O devices.

A

Virtual Machine Monitor (VMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Designed specifically to support multiple virtual machines and to provide core functionalities, such as resource scheduling, I/O stacks, etc.

A

Hypervisor kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Functionality of a hypervisor kernel

A

Same functionality as other OSs, such as process creation, file system management, and process scheduling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Two components of a hypervisor

A

1) Kernel 2) Virtual Machine Monitor (VMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Software that allows multiple OSs to run concurrently on a physical machine and to interact directly with the physical hardware.

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Technique of masking or abstracting the physical compute hardware and enabling multiple OSs to run concurrently on a single or clustered physical machine(s).

A

Compute Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Another name for the virtualization layer

A

Hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Layer which resides between hardware and VMs

A

Virtualization Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Logical entity that looks and behaves like a physical machine

A

Virtual Machine (VM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

First step towards building a cloud infrastructure

A

Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which is the primary function of a hypervisor?a. Allows multiple OSs to run concurrently on a physical machine.b. Allows multiple OSs to run concurrently on a VM.c. Allows multiple file systems to run concurrently on a VM

A

a. Allows multiple OSs to run concurrently on a physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which VMFS feature ensures that a VM is not powered on by multiple compute systems at the same time?a. On-power lockb. On-VM lockc. On-disk lockd. On-compute lock

A

c. On-disk lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which technology enables a physical CPU to appear as two or more logical CPUs?a. Hyper-threadingb. Multi-corec. Load balancingd. Ballooning

A

a. Hyper-threading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which parameter determines the maximum amount of resource that a VM can consume?a. Shareb. Limitc. Reservationd. Priority

A

b. Limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What is stored in a VM log file?a. Information of the VM’s activitiesb. VM’s RAM contentsc. VM’s BIOS informationd. Information of the VM’s configuration

A

a. Information of the VM’s activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Contained in the Virtual Machine configuration file

A

Number of CPUs, memory, number and type of network adapters, number and type of disks3.17

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

How does a large cache in a storage array improve performance?

A

A large cache in a storage array improves performance by retaining frequently accessed data for a longer period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

True or False: A policy may be applied to one or more previously defined storage groups.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

True or False: Tiering at the sub-LUN level moves more active data to faster drives and less active data to slower drives.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

True or False: Traditional storage tiering moves an entire LUN from one tier of storage to another.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Configures data movement within a storage array (intra-array) or between storage arrays (inter-array).

A

Automated Storage Tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Each storage tier is optimized for what?

A

Each storage tier is optimized for a specific characteristic, such as performance, availability, or cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Thin LUNs are most appropriate for what type of applications?

A

Applications that can tolerate some variation in performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

True or False: Adding drives to a Thin pool increases the available shared capacity for all the Thin LUNs in the pool.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What happens to allocated capacity when Thin LUNs are destroyed?

A

Allocated capacity is reclaimed by the Thin pool when Thin LUNs are destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

From the operating system’s perspective, Thin LUNs appear as what?

A

As traditional LUNs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Provides more efficient utilization of storage reducing the amount of allocated, but unused physical storage.

A

Virtual Provisioning (Thin Provisioning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Provides an abstraction layer, enabling clients to use a logical name that is independent of the actual physical location.

A

Namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

How does global namespace in a file-level storage virtualization appliance simplify access to files?

A

Clients no longer need to have multiple points to access data located on different NAS devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Maps logical path of a file to the physical path names.

A

Global namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Enables clients to access files using logical names which are independent of the actual physical location.

A

Global namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Used to map the logical path of a file to the physical path name.

A

Global Namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

File-level virtualization simplifies what?

A

File mobility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Implemented using global namespace.

A

File-level Storage Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Enables movement of files between NAS systems without impacting client access.

A

File-level Storage Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Eliminates dependencies between the file and its location.

A

File-level Storage Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

How does a virtualization appliance handle extents?

A

The virtualization appliance aggregates extents and applies RAID protection to create virtual volumes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

True or False: Extents may be all of part of the underlying storage volume.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Available capacity on a storage volume is used to create what?

A

Extents and virtual volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A device or LUN on an attached storage system that is visible to the virtualization appliance.

A

Storage volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Takes a single large LUN from an array, slices it into smaller virtual volumes, and presents these volumes to the compute systems.

A

Block-level storage virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What does block-level storage virtualization support?

A

1) Dynamic increase of storage volumes. 2) Consolidation of heterogeneous storage arrays. 3) Transparent volume access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Uses virtualization appliance to perform mapping operation.

A

Block-level Storage Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Makes underlying storage infrastructure transparent to compute.

A

Block-level Storage Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Enables significant cost and resource optimization.

A

Block-level Storage Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Creates an abstraction layer at the SAN, between physical storage resources and volumes presented to compute.

A

Block-level Storage Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Where is virtualization applied in NAS?

A

At the file level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Where is virtualization applied in a SAN?

A

At the block level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

True or False: Network-based storage virtualization can be implemented in both SAN and NAS environments.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What manages an NFS volume?

A

The NFS volume is managed entirely by the NAS system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

When is RDM recommended?

A

1) When there is a large amount of data on the LUN in the storage system. 2) When it is not practical to move the data onto a virtual disk. 3) When clustering a virtual machine with a physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Contains a symbolic link on VMFS volume to the LUN; acts as a proxy that allows direct access to a LUN.

A

Raw Device Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

True or False: VMFS can be dynamically expanded without disrupting running VMs.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Used for providing storage space for creating VMFS to store virtual machine files.

A

VMFS volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What does VMFS provide to ensure that the same virtual machine is not powered on by multiple compute systems at the same time?

A

On-disk Locking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Hypervisor’s native file system to manage VM files

A

Virtual Machine File System (VMFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Places very active parts of a LUN on high-performing Enterprise Flash Drives (EFDs).Places less active parts of a LUN on higher-capacity, more cost-effective SATA drives.Moves data at the extent group level.

A

Data movement at the sub-LUN level by EMC Symmetrix VMAX - FAST VP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Granularity with with FAST VP monitors data access

A

Each 7,680 KB region of storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

EMC FAST VP

A

Proactively monitors workloads at sub-LUN level in order to identify “busy” data that would benefit from being moved to higher-performing enterprise flash drives. Also identifies less “busy” data that could be moved to higher-capacity drives, without affecting the existing performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Automates the identification of Thin LUN extents for purposes of relocating application data across different performance / capacity tiers within an array.

A

EMC Symmetrix VMAX - FAST VP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Product that provides automated storage tiering for Thin pools.Supports data movement at sub-LUN level.Moves data based on user-defined policies and application performance needs.Data movement is automatic and non-disruptive.

A

EMC Symmetrix VMAX - FAST VP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

True or False: EMC VPLEX has a unique clustering architecture that allows VMs at multiple data centers to have read/write access to shared block storage devices.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Where does EMC VPLEX reside?

A

Between the compute and heterogeneous storage systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Adds support for data mobility and access over extended asynchronous distances (beyond 100 km).

A

EMC VPLEX Geo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Only platform (as of late 2012) that delivers both local and distributed federation in a storage virtualization context.

A

EMC VPLEX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Three deployment models of EMC VPLEX

A

1) VPLEX Local 2) VPLEX Metro 3) VPLEX Geo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

EMC VPLEX

A

Next generation solution for non-disruptive data mobility and information access within, across and between VDCs. Allows VMs at multiple VDCs to access the shared block storage device. Resides between compute and heterogeneous storage systems, virtualizing data movement. Offers three deployment models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Automates the identification of active or inactive data to relocate them to different performance / capacity tiers between the arrays.

A

Inter-Array Automated Storage Tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Benefits of Cache Tiering

A

1) Provides excellent performance benefit during peak workload. 2) Non-disruptive and transparent to applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Creates a large capacity secondary cache using SSDs.Enables tiering between DRAM cache and SSD drives (secondary cache).Most reads are now served directly from high performance tiered cache.

A

Cache Tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Manage data movement across storage types in an automated storage tiering context.

A

Policies (a.k.a., tier usage rules)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

A logical collection of LUNs that are to be managed together.

A

Storage Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Combination of drive technology (SSD, FC, or SATA) and a RAID protection type.

A

Storage Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Three major building blocks of automated storage tiering

A

1) Storage Type 2) Storage Groups 3) Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

True or False: Movement of data with much finer granularity (e.g., 8MB) greatly enhances the value proposition of automated storage tiering.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Enables a LUN to be broken down into smaller segments and tiered at that level.

A

Sub-LUN Tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Automates the storage tiering process within an array.Enables efficient use of SSDs and SATA drive technologies.Performs data movements between tiers at sub-LUN level.Employs cache tiering to improve application performance further.

A

Intra-Array Automated Storage Tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Automated Storage Tiering

A

Automates the storage tiering process. Enables the non-disruptive data movement between tiers. Improves application performance at the same cost or provides the same performance at a lower cost. Configures data movement within a storage array (intra-array) or between storage arrays (inter-array).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

In a storage tiering context, policies may be based on what factors?

A

File type, frequency of access, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Efficient storage tiering requires implementation of what?

A

Policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Storage Tiering Implementation Types

A

Manual storage tiering - Automated storage tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Establishing a hierarchy of storage type, and identifying the candidate data to relocate to the appropriate storage type to meet service level requirements at minimal cost.

A

Storage Tiering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

True or False: For applications demanding higher service levels, traditional LUNs on RAID groups are a more suitable choice than virtual provisioning.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Virtual Provisioning Best Practices

A

1) Drives in Thin pool should have the same RPM. 2) Drives in the Thin pool should be of the same size. 3) Provision Thin LUNs for applications that can tolerate some variation in performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Virtual Provisioning Benefits

A

1) Reduces administrative overhead. 2) Improves capacity utilization. 3) Reduces cost. 4) Reduces downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Thin Disk Provisioning

A

Hypervisor allocates storage space to the virtual disk only when the VM requires storage space. Eliminates the allocated, but unused storage capacity at the virtual disk. Eliminates the need to overprovision virtual disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Thick disk provisioning

A

Entire provisioned space is committed to the virtual disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Two options for provisioning storage to virtual disk offered by the hypervisor

A

1) Provisioning thick disk 2) Provisioning thin disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

How is virtual provisioning done at the compute level?

A

Hypervisor performs virtual provisioning to create virtual disks for VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Benefit of Thin Pool Rebalancing

A

Enables spreading out the data equally on all the physical disk drives within the Thin Pool, ensuring that the used capacity of each disk drive is uniform across the pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Restripes data across all the disk drives (both existing and new disk drives) in the thin pool.

A

Thin Pool Rebalancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Provides the ability to automatically rebalance allocated extents on physical disk drives over the entire pool when new drives are added to the pool.

A

Thin Pool Rebalancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Balances the used capacity of physical disk drives over the entire pool when new disk drives are added.Restripes data across all disk drives.

A

Thin Pool Rebalancing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

How is a Thin Pool created?

A

By specifying a set of drives and a RAID type for that pool. Thin LUNs are then created out of that pool (similar to traditional LUN created on a RAID group).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

True or False: Drives can be added to a Thin Pool while the pool is being used in production.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

True or False: Multiple thin pools may be created within a storage array.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Collection of physical drives that provide the actual physical storage used by Thin LUNs.Can be expanded dynamically.

A

Thin Pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

From what is physical storage allocated to the Thin LUN?

A

Thin Pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Minimum amount of physical storage allocated at a time to a Thin LUN from a Thin Pool

A

Thin LUN Extent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Logical device where the physical storage need not be completely allocated at the time of creation.Seen by the OS as a traditional LUN.Best suited for environments where space efficiency is paramount.

A

Thin LUN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Basic benefit of virtual provisioning

A

Better storage capacity utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Ability to present a logical unit (Thin LUN) to a compute system, with MORE capacity than what is physically allocated to the LUN on the storage array.

A

Virtual Provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Capacity-on-demand from a shared storage pool, called Thin pool.Physical storage is allocated only when the compute requires it.

A

Virtual Provisioning (Thin Provisioning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Where Virtual (Thin) provisioning may be implemented

A

Storage layer - Compute layer: virtual provisioning for virtual disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Ability to present a LUN to a compute system with MORE capacity than what is physically allocated to the LUN.

A

Virtual Provisioning (Thin Provisioning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Benefits of global namespace

A

By bringing multiple file systems under a single namespace, global namespace provides a single view of the directories and files. Provides administrators a single control point for managing files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Provides an abstraction layer in the NAS / File servers environment.

A

File-level Storage Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

File-Level Storage Virtualization - Global Namespace

A

Enables clients to access files using logical names which are independent of the actual physical location. Maps logical path of a file to the physical path names. Simplifies access to files: clients no longer need to have multiple mount points to access data located on different NAS devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Mechanisms used by a virtualization appliance to divide storage volumes.May be all or part of the underlying storage volume.Aggregated by the virtualization appliance and subjected to RAID protection to create virtual volumes.Vendor-specific terminology

A

Extents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Encapsulates physical storage devices and applies layers of logical abstraction to create virtual volumes.

A

Virtualization appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

True or False: Block-level storage virtualization enables the combination of several LUNs from one or more arrays into a single virtual volume before presenting it to the compute system.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Role of the virtualization appliance in block-level storage virtualization

A

Performs mapping between the virtual volume and the LUNs on the array.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Block-level Storage Virtualization

A

Creates an abstraction layer at the SAN, between physical storage resources and volumes presented to compute. Uses virtualization appliance to perform mapping operation. Makes underlying storage infrastructure transparent to compute. Enables significant cost and resource optimization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Facilitates an Information Lifecycle Management (ILM) strategy

A

Deploying block-level storage virtualization in a heterogeneous arrays environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Enables non-disruptive data migration between arrays.

A

Network-based virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Provides ability to pool heterogeneous storage resources.Performs non-disruptive data migration.Manages a pool of storage resources from a single management interface.

A

Network-based virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

How network-based storage virtualization is applied

A

Block-level (SAN) - File-level (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Embeds storage virtualization intelligence at the network layer.

A

Network-based virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Created on a NAS device.Provides storage to VM.Accessed by multiple compute systems simultaneously.

A

NFS Volumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

True or False: Hypervisors come with NFS client software for NFS server (NAS) access.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Used by the hypervisor to access the NAS file system

A

NFS protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

In Raw Device Mapping, what file on the VMFS volume is used?

A

Mapping File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Benefits of Raw Device Mapping

A

1) Provides solution when huge volume of data on LUN is not practical to move onto a virtual disk. 2) Enables clustering the VM with the physical machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

When is Raw Device Mapping (RDM) useful?

A

RDM is useful when the applications running on the VMs are required to know the physical characteristics of the storage device.

162
Q

Enables VM to directly access LUNs in a storage system.

A

Raw Device Mapping (RDM)

163
Q

Methods to expand VMFS

A

1) Expand VMFS dynamically on the volume partition on which it is located. 2) Add one or more LUNs to the source VMFS volume.

164
Q

Characteristics of VMFS

A

Hypervisor’s native file system to manage VM files. Cluster File System - can be access by multiple compute systems simultaneously for reads and writes; Provides on-disk locking. Uses a VMFS volume to store VM files.

165
Q

Two file systems used by the hypervisor to manage the VM files

A

1) Virtual Machine File System (VMFS) - the hypervisor’s native file system 2) Network File System (NFS) such as NAS file system

166
Q

How does a virtual disk appear to a VM?

A

As a local physical disk drive.The hypervisor may access a FC storage device, IP storage devices such as iSCSI, and NAS devices.

167
Q

VM remains unaware of what?

A

Total space available to the hypervisor. Underlying storage technologies.

168
Q

How are VMs stored?

A

As a set of files on storage space available to the hypervisor.

169
Q

Examples of storage virtualization at the storage layer

A

Virtual provisioning - Automated storage tiering

170
Q

Examples of storage virtualization at the network layer

A

Block-level virtualization - File-level virtualization

171
Q

Example of storage virtualization at the compute layer

A

Storage provisioning for VMs.

172
Q

Benefits of Storage Virtualization

A

Adds or removes storage without any downtime.Increases storage utilization thereby reducing TCO. Provides non-disruptive data migration between storage devices. Supports heterogeneous, multi-vendor storage platforms. Simplifies storage management.

173
Q

How is storage virtualization created and assigned?

A

Virtual volumes are created from the storage pools and are assigned to the compute system.

174
Q

Performs logical to physical storage mapping.Abstracts the identify of physical storage devices.Creates a storage pool from multiple, heterogeneous storage arrays.

A

Virtualization layer

175
Q

Process of masking the underlying complexity of physical storage resources and presenting the logical view of these resources to compute systems.

A

Storage Virtualization

176
Q

What defines the minimum amount of physical storage allocated at a time to a thin LUN from a thin pool?a. Thin LUN extentb. Thin LUN capacityc. Thin LUN factord. Thin LUN set size

A

a. Thin LUN extent

177
Q

When is a thin LUN preferred over a traditional LUN?a. Performance is predominant.b. Security is more important.c. Storage space efficiency is paramount.d. High availability is predominant.

A

c. Storage space efficiency is paramount.

178
Q

What is used to create secondary cache in a cache tiering mechanism?a. DRAMb. FC drivec. Solid state drived. SATA drive

A

c. Solid state drive

179
Q

What are the three major building blocks of automated storage tiering?a. RAID type, storage type, policiesb. Storage type, storage group, policiesc. Storage group, RAID group, storage typed. Storage group, RAID group, group policy

A

b. Storage type, storage group, policies

180
Q

Which method enables a VM to directly access a LUN on a storage array?a. File system lockingb. VM clusteringc. Raw device mappingd. Virtual storage mapping

A

c. Raw device mapping

181
Q

Enables guaranteed service levels when traffic from multiple virtual networks share physical network resources.Sets priority for bandwidth allocation to different types of traffic.

A

Resource sharing without contention

182
Q

Allows using a policy for distribution of traffic across VMs and network links.Allows using a policy for traffic failover across network links.

A

Policy-based management

183
Q

Technique to distribute workload across multiple physical or virtual machines and parallel network links to prevent overutilization or underutilization of these resources and to optimize performance.

A

Load balancing

184
Q

Key objective in managing network traffic

A

Load balancing

185
Q

How does the hypervisor kernel recognize a CNA?

A

As a NIC and a FC HBA

186
Q

Provides connection to hypervisor kernel and directs hypervisor traffic: management, storage, and VM migration.

A

Virtual Switch

187
Q

Provides connection to virtual NICs and forwards VM traffic.

A

Virtual Switch

188
Q

Virtualized to create virtual networks (e.g., VLAN, VSAN).

A

VM and physical networks

189
Q

Resides inside physical server.

A

Virtual Machine (VM) Network

190
Q

Provides connectivity to a hypervisor kernel.

A

Virtual Machine (VM) Network

191
Q

Provides connectivity among VMs INSIDE a physical server.

A

Virtual Machine (VM) Network

192
Q

Consists of logical switches called “virtual switches”.

A

Virtual Machine (VM) Network

193
Q

Connectivity provided by physical networks

A

1) Among physical servers running hypervisors. 2) Between physical servers and clients. 3) Between physical servers and storage systems.

194
Q

A physical network consists of what physical components?

A

1) Network adapters (NICs) 2) Switches 3) Routers 4) Bridges 5) Repeaters 6) Hubs

195
Q

Enforces routing for communication between virtual networks.

A

Network Virtualization

196
Q

Enables functional grouping of nodes in a virtual network.

A

Network Virtualization

197
Q

Allows communication between nodes in the same virtual network without routing or frames.

A

Network Virtualization

198
Q

Technology that defines how multiple virtual servers can share a single physical Fibre Channel port identification (ID).

A

N_Port ID virtualization (NPIV)

199
Q

Allows a single HBA or target port on a storage array to register multiple World Wide Port Names (WWPNs) and N_Port identification numbers.

A

N_Port ID Virtualization (NPIV)

200
Q

PowerPath/VE Features

A

Dynamic Load Balancing - Automated Performance Optimization - Dynamic Path Failover - Wide Variety of Storage Array Support - Automatic Path Testing - Monitoring and Alerting

201
Q

Operation of EMC PowerPath/VE

A

Added to the hypervisor kernel. All I/Os to storage run through PowerPath/VE, which distributes I/O requests to a LUN across all the available paths.

202
Q

Provides a multipathing solution for VMware ESX/ESXi and Microsoft Hyper-V.Delivers advanced multipathing compared to hypervisor’s native multipathing.

A

EMC PowerPath/VE

203
Q

Controls multiple VEMs as one distributed virtual switch/

A

Cisco Nexus 1000V Virtual Supervisor Module (VSM)

204
Q

What is the VSM?

A

VSM is the Cisco NX-OS network operating system running on a VM.

205
Q

Where does the Nexus 1000V’s Virtual Supervisor Module (VSM) run?

A

Cisco NX-OS network OS running in a VM.

206
Q

Nexus 1000V component which controls multiple VEMs as one distributed virtual switch.

A

Virtual Supervisor Module (VSM)

207
Q

Nexus 1000V component that runs inside the hypervisor and replaces the hypervisor’s virtual switch functionality.

A

Virtual Ethernet Module (VEM)

208
Q

Two components of Cisco Nexus 1000V

A

1) Virtual Ethernet Module (VEM) 2) Virtual Supervisor Module (VSM)

209
Q

Cisco’s third-party distributed virtual switch for VMware ESX/ESXi.Separates VDC and compute administration.

A

Cisco Nexus 1000V

210
Q

Provides the capability to recognize an alternate I/O path to a LUN and enables failover.

A

Multipathing

211
Q

Process of detecting a failed path and rerouting I/O to another path.

A

Path Failover

212
Q

Built into hypervisor or provided by third-party.Recognizes alternate I/O path to a LUN and enables failover.Performs load balancing by distributing I/o to all available paths.

A

Multipathing

213
Q

Technique allowing a physical server to use multiple physical paths for transferring data between the physical server and a LUN on a storage system.

A

Multipathing

214
Q

What happens if a burst exceeds the configured burst size?

A

Remaining frames will be queued for later transmission. If the queue is full, the frame will be dropped.

215
Q

Where traffic shaping can be enabled and configured

A

At the virtual switch / distributed virtual switch or at the port group level.

216
Q

Max amount of data allowed to transfer in a burst.Bandwidth x time

A

Burst Size

217
Q

Traffic that exceeds the average bandwidth

A

Burst

218
Q

Max data transfer rate without queuing / dropping frames

A

Peak bandwidth

219
Q

Data transfer rate allowed over time.Workload at a switch port can intermittently exceed this.

A

Average bandwidth

220
Q

Three traffic shaping parameters

A

Average bandwidth - Peak bandwidth - Burst size

221
Q

Controls network bandwidth at virtual / distributed virtual switch or port group.Prevents impact on business-critical application traffic by non-critical traffic flow.

A

Traffic Shaping

222
Q

Improve service levels for critical applications.

A

Limit and Share

223
Q

Configurable parameters at a distributed virtual switch.Configured to control different types of network traffic, competing for a physical NIC or NIC team.Ensure that business critical applications get required bandwidth.

A

Limit and Share

224
Q

Specifies relative priority for allocating bandwidth to different traffic types.Is specified as numbers.Applies to a physical NIC.

A

Share

225
Q

Sets limit on maximum bandwidth per traffic type (traffic type will not exceed limit).Specified in Mbps.Applies to a NIC team.

A

Limit

226
Q

Allows associating policies for load balancing and failover at a virtual switch or a port group.

A

NIC teaming

227
Q

Allows distribution of all outbound network traffic across active physical NICs.

A

Load balancing

228
Q

Logically groups physical NICs connected to a virtual switch

A

NIC Teaming

229
Q

True or False: With Storm Control, a switch port blocks traffic if threshold is reached and drops the subsequent frames over the next time interval.

A

TRUE

230
Q

Example of software-based load balancer

A

Microsoft Network Load Balancing

231
Q

True or False: The real IP addresses of the servers are known only to the load balancing device, which decides where to forward the request.

A

TRUE

232
Q

Three Load Balancing Policies

A

Round Robin - Weighted Round Robin - Least Connections

233
Q

7 Key Network Traffic Management Techniques

A
  1. Balancing client workload: Hardware based 2. Balancing client workload: Software based 3. Storm control 4. NIC teaming 5. Limit and share 6. Traffic shaping 7. Multipathing
234
Q

Three Requirements for Network Traffic Management

A

1) Load Balancing 2) Policy-based Management 3) Resource sharing without contention

235
Q

Use of FCoE in a CDC

A

FCoE facilitates the convergence of the LAN and FC SAN traffic over a single Ethernet infrastructure.

236
Q

Restriction on VLANs configured for VSANs

A

VLANs configured for VSANs should not be used for LAN traffic.VLAN must be unique for each VSAN.

237
Q

What converges VLAN and VSAN?

A

Fiber Channel over Ethernet (FCoE) - Requires a VLAN for each VSAN.

238
Q

Fabric Services

A

Name Server - Zoning

239
Q

True or False: A VSAN has its own fabric services (name server, zoning), configuration, and set of FC addresses.

A

TRUE

240
Q

A logical fabric on an FC SAN that enables communication among a group of nodes, regardless of their physical location in the fabric.

A

Virtual Storage Area Network (VSAN)

241
Q

What has to happen for a VM to be connected to multiple VLANs?

A

The guest OS running on the VM must support VLAN trunking.

242
Q

Process of inserting or removing a marker (tag) with VLAN-specific information (VLAN ID) into the Ethernet frame.

A

VLAN Tagging

243
Q

Benefits of VLAN Trunking

A

Eliminates the need for dedicated network link(s) for each VLAN. Reduces inter-device links when the devices have more than one VLAN. Reduces the number of virtual NICs, storage ports, and switch ports. Reduces management complexity.

244
Q

Mechanism to achieve VLAN trunking

A

VLAN tagging

245
Q

A technology that allows traffic from multiple VLANs to traverse a single network connection.

A

VLAN Trunking

246
Q

Can a VM or storage system be a member of multiple VLANs?

A

Yes.Requires support of respective OS.

247
Q

When does a node become a VLAN member?

A

When connected to VLAN ports

248
Q

Process for configuring a VLAN

A
  1. Define VLAN IDs on physical switch. 2. Choose necessary VLAN IDs from the hypervisor’s built-in VLAN ID pool, required for virtual switches. 3. Assign VLAN ID to physical or virtual switch port, to include switch ports to a VLAN and to enable grouping of switch ports into VLANs.
249
Q

Most common technique to assign VLAN IDs to switch ports in a VDC environment

A

Port-based VLAN

250
Q

Techniques to assign VLAN IDs to switch ports

A

1) Port-based VLAN 2) MAC-based VLAN 3) Protocol-based VLAN 4) Policy-based VLAN

251
Q

Benefits of VLANs

A

1) Controls broadcast activity and improves network performance. 2) Simplifies management. 3) Increases security levels. 4) Provides higher utilization of switch and reduces CAPEX.

252
Q

A logical network, created on a LAN or across LANs consisting of physical and virtual switches, enabling communication among a group of nodes, regardless of their location in the network.

A

VLAN

253
Q

True or False: The hypervisor kernel has a built-in software iSCSI initiator.

A

True. This software initiator is used to perform iSCSI processing when hypervisor accesses the iSCSI storage via physical NICs.

254
Q

iSCSI HBA

A

Transfers hypervisor storage I/Os (SCSI I/Os) to iSCSI storage systems. Has built-in iSCSI initiator. Encapsulates SCSI I/O into iSCSI frames and then encapsulates iSCSI frames into Ethernet frames.Uses its own MAC and IP addresses for transmission of Ethernet frames over the Ethernet network. Offloads iSCSI processing (SCSI to iSCSI) from hypervisor.

255
Q

Hypervisor recognizes it as an FC HBA and as a NIC.NIC: Used as a link between virtual and physical switches.FC HBA: Provides hypervisor access to the FC storage.

A

Converged Network Adapter (CNA)

256
Q

Transfers hypervisor storage I/Os (SCSI I/Os) to FC storage systems.Encapsulates SCSI data into FC frame.Uses its own FC address for transmission of frames over FC network.

A

FC HBA

257
Q

How does a PNIC handle Ethernet frames?

A

Ethernet frames are transferred through physical NICs without modification.

258
Q

True or False: Physical NICs are not addressable from the network.

A

True.IP address not assigned to a PNIC (prohibits OSI Layer 3 access). MAC addresses not available (prohibits OSI Layer 2 access).

259
Q

Used as inter-switch links (ISLs) between virtual and physical Ethernet switches.

A

Physical NICs (PNICs)

260
Q

Distributed Virtual Switch Benefits

A

1) Centralizes VM network management. 2) Maintains network policies during VM migration - allows movement of port group policies with VM.

261
Q

Aggregation of multiple virtual switches distributed across multiple physical servers

A

Distributed Virtual Switch

262
Q

VMs connected to a VM port group share what?

A

Common configuration

263
Q

Policy Examples

A

Security - Load balancing and failover across PNICs - Limiting network bandwidth for VMs - Virtual LAN assignment to a VM port group to transfer the VM traffic.

264
Q

Mechanism for applying uniform network policy settings to a group of VM ports

A

VM Port Group

265
Q

Virtual switch port which provides connectivity to hypervisor kernel

A

Hypervisor kernel port

266
Q

Virtual switch port which provides connectivity to virtual NICs

A

VM port

267
Q

Virtual switch port which provides connectivity to physical NIC

A

Uplink port

268
Q

Types of Virtual Switch Ports

A

1) Hypervisor kernel ports 2) VM ports 3) Uplink ports

269
Q

Are physical NICs shared between virtual switches?

A

No.

270
Q

How are frames transferred between virtual switches?

A

Through VMs

271
Q

True or False: There is no direct connection between virtual switches within a compute system.

A

TRUE

272
Q

Example scenario for a virtual switch that connects to no physical NIC.

A

A virtual switch connecting a VM running a firewall application to another VM protected by the firewall.

273
Q

What does a virtual switch do if it has no connection to a physical NIC?

A

If the virtual switch has no connection to a physical NIC, it directs VM traffic WITHIN the physical server.

274
Q

True or False: A virtual switch has no control over inbound traffic. Load balancing and failover of inbound traffic is performed by supported physical switches that are connected to the virtual switch via physical NICs.

A

TRUE

275
Q

True or False: A virtual switch may connect to multiple physical NICs, supporting load balancing and failover.

A

TRUE

276
Q

A logical Layer 2 switch that supports Ethernet protocol.Resides inside a physical server.Is created and configured by / through the hypervisor.Maintains MAC address table for frame forwarding.Directs network traffic to / from VMs and hypervisor kernel.

A

Virtual Switch

277
Q

True or False: In the absence of virtual HBA, VMs share the WWN identity of a physical HBA or CNA to access RDM disks. There is no option to uniquely secure and manage storage for an individual VM.

A

TRUE

278
Q

True or False: A VM with a virtual HBA is recognized as a node in the fabric, allowing an administrator to restrict access to specific LUNs to specific VMs using zoning and LUN masking.

A

TRUE

279
Q

Leverages NPIV to instantiate virtual N_ports.Assigns the virtual N_ports to the VMs.

A

Hypervisor kernel

280
Q

Enables a VM to access FC RDM disk / LUN assigned to the VM.Configured using N_Port ID Virtualization (NPIV) technology.Enables zoning and LUN masking at the VM level.

A

Virtual HBA

281
Q

What generates the MAC addresses and allocates a MAC address to a virtual NIC at the time of VM creation?

A

Hypervisor

282
Q

Connects VMs to virtual switch.Forwards Ethernet frames to virtual switch.Has unique MAC and IP addresses.Supports Ethernet standards similar to physical NIC.

A

Virtual NIC (VNIC)

283
Q

Provides the connection between a virtual switch and a physical FCoE switch.

A

Converged Network Adapter (CNA)

284
Q

Traffic type between hypervisor kernel and CNA

A

FC storage

285
Q

Traffic types between FC / iSCSI HBA and physical switch (FC/Ethernet)

A

FC or iSCSI storage

286
Q

Provide a link between the virtual and physical switches.Forwards VM and hypervisor kernel traffic between the switches.

A

Physical NICs (PNICs)

287
Q

Traffic types between hypervisor kernel and virtual switch

A

Management - IP Storage - VM Migration

288
Q

Traffic types between PNIC and physical switch

A

VMManagement - IP Storage - VM Migration

289
Q

Forms physical network that supports Ethernet / FC / iSCSI / FCoE.Provides connections among physical servers, between physical servers and storage systems, and between physical servers and clients.

A

Physical switch, router

290
Q

Connects physical servers to physical network.Forwards VM and hypervisor traffic to / from physical network.

A

Physical adapter: NIC, HBA, CNA

291
Q

An Ethernet switch that forms the VM network.

A

Virtual Switch

292
Q

Enables a VM to access Fibre Channel (FC) RDM disk / LUN assigned to the VM

A

Virtual HBA

293
Q

Connects VMs to the VM network.Sends / receives VM traffic to / from the VM network.

A

Virtual NIC

294
Q

Components of VDC Network Infrastructure

A

Virtual NICVirtual HBAVirtual Switch——————-Physical Adapter (NIC, HBA, CNA) - Physical switch, router

295
Q

Benefits of Network Virtualization

A

1) Enhances security 2) Enhances performance 3) Improves manageability 4) Improves utilization and reduces CAPEX

296
Q

Hypervisor (as a network virtualization tool)

A

Uses built-in networking and network virtualization functionalities to create virtual switches and configuring virtual networks on the virtual switches. Alternatively, uses third-party software for providing networking and network virtualization functionalities. Third-party software is installed on it and replaces the native networking functionality

297
Q

Network Virtualization Tools

A

1) Physical switch’s Operating System (OS) 2) Hypervisor

298
Q

True or False: VM and physical networks are virtualized to create virtual networks, for example: virtual LAN, virtual SAN.

A

TRUE

299
Q

Resides INSIDE a physical server.Consists of logical switches called virtual switches.Provides connectivity among VMs inside a physical server.Provides connectivity to Hypervisor kernel.Connects to physical network via PNIC.

A

Virtual Machine (VM) Network

300
Q

Involves virtualizing physical and virtual machine networks.

A

Network Virtualization in the VDC

301
Q

Network Virtualization

A

Enables virtual networks to share network resources. Allows communication between nodes in the same virtual network without routing or frames. Enforces routing for communication between virtual networks. Restricts management traffic, including “Network Broadcast”, from propagating to other virtual networks. Enables functional grouping of nodes in a virtual network.

302
Q

Process of logically segmenting or grouping physical network(s) and making them operate as single or multiple independent network(s) called “Virtual Network(s)”.

A

Network Virtualization

303
Q

Which describes N_Port ID Virtualization?a. Single physical FC HBA port functions as multiple virtual N_ports b. Single physical FC HBA port functions as multiple virtual E_portsc. Single virtual FC HBA port functions as multiple physical N_ports

A

a. Single physical FC HBA port functions as multiple virtual N_ports

304
Q

What is enabled by using NIC teaming?a. Balance traffic across physical servers.b. Allocate bandwidth to traffic based on priority.c. Failover to another available physical NIC in the event of a physical NIC failure.

A

c. Failover to another available physical NIC in the event of a physical NIC failure.

305
Q

Which technique allows traffic from multiple VLANs to traverse over a single network connection?a. NIC teamingb. Multipathingc. Port Groupd. Trunking

A

d. Trunking

306
Q

Which network parameter sets maximum data transfer rate across a VM port group without queuing or dropping frames?a. Burst sizeb. Peak bandwidthc. Shared. Limit

A

b. Peak bandwidth

307
Q

Which is a benefit of network virtualization?a. Enhanced storm controlb. Increased resource acquisitionc. Improved manageabilityd. Better policy control

A

c. Improved manageability

308
Q

Example of when a connection broker might not be needed.

A

When a organization dedicates VMs to each user.

309
Q

Example of when a connection broker would be needed.

A

With VM pools.

310
Q

True or False: A VM pool shares VMs for concurrent use by many users.

A

TRUE

311
Q

True or False: Each VM may be dedicated to a specific user or allocated in a pool.

A

True.

312
Q

Breaks the dependency between the application and the underlying platform that includes OS and hardware.

A

Application Virtualization

313
Q

When is a connection broker a mandatory component of VDI architecture?a. When desktop VMs are assigned from VM pool.b. When high-end graphic applications are usedc. When additional security is required.

A

a. When desktop VMs are assigned from VM pool. Generally speaking, a connection broker would be needed with VM pools.

314
Q

What is true about application streaming?a. Requires no agent at client machine.b. Requires a locally installed agent on the client machine and a built-in agent on the application.c. Requires a locally installed agent on the client machine.

A

c. Requires a locally installed agent on the client machine.

315
Q

What is true about application encapsulation?a. Requires a locally installed agent on the client machine.b. Requires a built-in agent at the remote server.c. Does not rely on software installation or underlying OS.

A

c. Does not rely on software installation or underlying OS.

316
Q

What correctly describes application virtualization?a. Encapsulates OS resources and the application.b. Increases application and CPU utilization.c. Provides interoperability between different application versions.

A

a. Encapsulates OS resources and the application.

317
Q

VMware product used for the management of the virtualization platform

A

vCenter

318
Q

VMware solution that provides storage optimization to reduce storage requirements and to simplify desktop management.

A

VMware View Composer

319
Q

VMware solution that provides centralized management and brokering of connections to desktops in the data center.

A

VMware View Manager

320
Q

VMware ThinApp

A

VMware application virtualization solution that links the app, Virtual OS (VOS), file system, and registry into a single package. Enables apps to run directly from storage devices such as USB or network share. Packages entire app and its settings into an executable file that is isolated from the desktop OS.

321
Q

Three Benefits of Application Virtualization

A

1) Simplified application deployment / retirement: apps are not installed. 2) Simplified operating system image management: apps are completely separate from OS; OS patches and upgrades do not affect the applications. 3) Elimination of resource conflicts: apps have their own virtual OS resources.

322
Q

Application Streaming

A

Application specific data / resources are transmitted to the client device when the application is executed. Minimum amount of data (~10 to 30% of total app) is delivered to the client. Additional application features are delivered on demand. Locally installed agents are required to run virtualized application.

323
Q

Application is converted into a self-contained package.Application packages may run from USB, CD-ROM or local disk,Built-in agents are present within the package.

A

Application Encapsulation

324
Q

Two Application Virtualization Deployment Methods

A

1) Application Encapsulation 2) Application Streaming

325
Q

Aggregates OS resources and the application into a virtualized container.

A

Application Virtualization

326
Q

Allows an application to be delivered in an isolated environment.

A

Application Virtualization

327
Q

Technique of presenting an application to an end user without any installation, integration, or dependencies on the underlying computing platform.

A

Application Virtualization

328
Q

Stores user’s data and settings in a central location

A

User state virtualization

329
Q

Two Benefits of User State Virtualization

A

1) Easier migration of user state during OS refresh / migration. 2) Makes data available to user regardless of endpoint device.

330
Q

Enabling technology for implementing desktop virtualization

A

User state virtualization

331
Q

Includes user’s data as well as application and OS configuration settings.

A

User State

332
Q

Three Considerations With A Move to VDI

A

1) Reliance on network connection 2) Unsuitable for high-end graphics applications 3) Requires additional infrastructure

333
Q

Three Benefits of VDI

A

1) Centralized deployment and management 2) Improved security 3) Improved business continuity and disaster recovery

334
Q

Responsible for establishing and managing the connection between the endpoint device and the desktop VM.

A

Connection Broker

335
Q

True or False: When provisioning a VM on a VM Hosting Server, a template or image may be used as a basis for the creation of the VM, settings, and disk.

A

TRUE

336
Q

Responsible for hosting the desktop VMs that are remotely delivered to the endpoint devices.

A

VM Hosting Servers

337
Q

Three VDI Components

A

1) Endpoint Devices 2) VM Hosting / Execution Servers 3) Connection Broker

338
Q

Another term for a server-hosted desktop virtualization solution approach

A

Virtual Desktop Environment (VDE)

339
Q

Each desktop has its own OS and applications installed.User has full access to resources of virtualized desktop.

A

Virtual Desktop Infrastructure (VDI)

340
Q

Involves hosting a desktop which runs as a VM on a server in a VDC.

A

Virtual Desktop Infrastructure (VDI)

341
Q

Four Benefits of RDS

A

1) Rapid Application Delivery 2) Improved Security 3) Centralized Management 4) Low-cost Technology When Compared to VDI

342
Q

In RDS, where does resource consumption take place?

A

On the server

343
Q

A terminal service runs on top of what?

A

a Windows installation

344
Q

RDS is traditionally known as what?

A

Terminal services

345
Q

Two Desktop Virtualization Techniques

A

1) Remote Desktop Services (RDS) 2) VIrtual Desktop Infrastructure (VDI)

346
Q

Five Benefits of Desktop Virtualization

A

1) Enablement of Thin Clients 2) Improved Data Security 3) Simplified Data Backup 4) Simplified PC Maintenance 5) Flexibility of Access

347
Q

Objective of desktop virtualization technology

A

Centralize the PC OS at the data center.

348
Q

Enables organizations to host centrally manage desktops.Desktops run as VMs within the VDC.Endpoint devices may be thin clients or PCs.

A

Desktop Virtualization

349
Q

Technology which enables detachment of the user state, the OS, and the applications from endpoint devices.

A

Desktop Virtualization

350
Q

Desktop Virtualization Drivers

A

1) Manageability Concerns 2) Security Concerns 3) Cost Concerns

351
Q

Isolate hardware from OS, application and user state

A

Desktop Virtualization

352
Q

Isolate the application from OS and hardware

A

Application Virtualization

353
Q

Example of a case where a connection broker would NOT be needed in a VDI architecture

A

When an organization dedicates VMs to each user.

354
Q

What is true about VDI?a. Involves hosting desktop which runs as hypervisor on the server.b. Requires hypervisor based VDI agent support.c. Each desktop has its own OS and applications in a VM on a server.

A

c. Each desktop has its own OS and applications in a VM on a server.

355
Q

Backup Considerations in a VDC

A

1) Reduced computing resources 2) Complex VM configurations

356
Q

Single Points of Failure in a VDC

A

SPOF in Compute InfrastructureSPOF in Storage InfrastructureSPOF in Network InfrastructureSite

357
Q

Which is used as a master copy to create and provision a new VM?a. VM templateb. VM snapshotc. VM cloned. VM backup

A

a. VM Template

358
Q

What describes the state of virtual disks of a VM after an array to array migration a. Virtual disks are maintained at both primary and secondary sites.c. Virtual disks are deleted from the primary site after they are copied to the secondary site.

A

c. Virtual disks are deleted from the primary site after they are copied to the secondary site.

359
Q

What occurs to the guest OS configuration when a VM is reverted from it snapshot?a. Guest OS configurations are reverted to the point-in-time of snapshot creation.b. Current guest OS configurations are preserved.

A

a. Guest OS configurations are reverted to the point-in-time of snapshot creation.

360
Q

Which is true about VM fault tolerance mechanism?a. Both primary and secondary VMs share the same virtual disks.b. Both primary and secondary VMs have separate virtual disks.c. Only primary VM can access the shared virtual disk.

A

a. Both primary and secondary VMs share the same virtual disks.

361
Q

What is an advantage of an image based backup approach?a. Single pass information collectionb. Reduced RPOc. Eliminate site failuresd. Reduced VM failures

A

a. Single pass information collection

362
Q

Provides advanced VM-level and application-level consistent backup.

A

EMC Data Domain

363
Q

Provides cost-effective bi-directional replication for DR.

A

EMC Data Domain

364
Q

Offers consolidation of server backup and archive data to a single storage system for optimized virtualization.Reduces redundant data across VMware data backups.

A

EMC Data Domain

365
Q

Addresses the challenge of extra storage and backup resources in VMware based virtualized environments, and accelerates VMware backups by 90%.

A

EMC Data Domain

366
Q

Target based deduplication and storage solution

A

EMC Data Domain

367
Q

True or False: EMC Avamar can perform backups securely over LAN/WAN using encryption at-rest or in-flight.

A

TRUE

368
Q

True or False: With EMC Avamar, data is deduplicated at the source before transferring across the network, thereby reducing network bandwidth for backup by 99%.

A

TRUE

369
Q

Employs RAIN architecture for HA and reliability

A

EMC Avamar

370
Q

Provides global source side deduplication at sub-file level, across sites and servers (physical as well as virtual).Reduces network bandwidth for backup by 99%.

A

EMC Avamar

371
Q

True or False: EMC Avamar provides single-step recovery of individual files or complete VMDK images to the original VM or a new VM.

A

TRUE

372
Q

Backup levels of EMC Avamar

A

1) Guest OS level 2) VM image level

373
Q

EMC solution offering optimized solutions for protecting VMware environments

A

EMC Avamar

374
Q

EMC deduplication and backup software system

A

EMC Avamar

375
Q

3 Key Features of VMware Storage vMotion

A

1) Zero downtime migrations with complete transaction integrity. 2) Complete OS and hardware independence. 3) Broad support for live migration of VM disk files across any FC SAN, iSCSI SAN, and NFS storage system supported by vSphere.

376
Q

Enables live migration of VM disk files across storage arrays.Provides relocation of VM disk files between and across shared storage locations.

A

VMware Storage vMotion

377
Q

4 Key Features of VMware vMotion

A

1) Multiple concurrent migrations to continuously optimize VM placement across the entire VDC environment. 2) VMware DRS underpinning, which continuously monitors the pooled resources of many servers. 3) Intelligently allocates available resources among VMs based on predefined rules that reflect business needs and changing priorities. 4) Faster and reliable recovery of VMs in the event of a server failure.

378
Q

Migrates VMs running any OS across any type of hardware and storage.

A

VMware vMotion

379
Q

4 Key Features of VMware FT

A

1) Automatically triggers seamless failover when the protected VMs fail to respond, resulting in zero downtime, zero data loss, and continuous availability. 2) Automatically triggers the creation of a new secondary VM after failover to ensure continuous protection to the application. 3) Compatible with all types of shared storage (e.g., FC, NAS, or iSCSI). 4) Compatibility with all OSs supported with VMware ESX.

380
Q

Provides zero downtime and zero data loss for any VM against failures in physical servers.Creates a live shadow instance of the primary running on another physical server.Keeps two instances in virtual lockstep with each other.

A

VMware Fault Tolerance (FT)

381
Q

True or False: VMware HA continuously and intelligently monitors capacity utilization and reserves spare capacity to be able to restart VMs.

A

TRUE

382
Q

4 Key Features / Benefits of VMware HA

A

1) Minimizes downtime and IT service disruption while eliminating the need for dedicated stand-by hardware and installation of additional software. 2) Provides uniform HA across the entire virtualized IT environment without the need of failover solutions tied to either OS or specific applications. 3) Detects OS failures within VMs. If a failure is detected, the affected VM is automatically restarted on the server. 4) Ensures that capacity is always available in order to restart all VMs affected by server failure.

383
Q

Automatically restarts VMs when servers or individual VMs unexpectedly fail (unplanned downtime)

A

VMware High Availability (HA)

384
Q

Three key technical features offered by SRM in the context of DR in a VDC

A

1) Accelerated recovery by automating execution of failover. 2) Simplified creation and management of recovery plans. 3) Improved reliability of recovery plans by simplifying recovery and testing.

385
Q

VMware workflow product that automates setup, failover, and testing of DR plans.

A

VMware vCenter Site Recovery Manager (SRM)

386
Q

EMC Avamar VE and EMC DataDomain

A

Offer highly optimized backup software and storage solutions for VDC.

387
Q

VMware vMotion and Storage vMotion

A

Enable migration of VMs

388
Q

VMware HA and VMware FT

A

Offer high availability and fault tolerance features for VMs in a VMware-based virtualized environment.

389
Q

VMware vCenter Site Recovery Manager

A

Automates and makes disaster recovery rapid, reliable, and manageable.

390
Q

Products that facilitate business continuity in the VDC

A

1) VMware vCenter Site Recovery Manager 2) VMware HA and VMware FT 3) VMware vMotion and Storage vMotion4) EMC Avamar VE and EMC DataDomain

391
Q

Failover challenges

A

Constraints on VM placement. For example, if selected VMs have to be placed on the same server / clustered servers.

392
Q

In a service failover scenario, can the secondary site have different x86 hardware configuration than those at the primary site?

A

Yes

393
Q

Two service failover steps

A

1) Replicated VMs are activated in the secondary (failover) site on the target servers. 2) The LUN at the primary site is made read-only and the LUN at the secondary site is made write-enabled.

394
Q

Steps performed during an outage at the primary VDC site

A

Service Failover

395
Q

True or False: By using array-to-array VM migration, VM migration can be performed across storage types such as Fibre Channel, iSCSI, and local SCSI.

A

TRUE

396
Q

Potential application scenarios for array-to-array VM migration

A

1) Moving a VM off a storage device for maintenance or reconfiguration. 2) Redistributing VMs or virtual disks to different storage devices in order to balance storage capacity. 3) Decommissioning of physical storage to be retired.

397
Q

Allows moving a live VM without ANY downtime.Independent of VM storage and type.

A

Array-to-Array VM Migration

398
Q

Uses storage array based technology to move VMs or virtual disks across storage devices.

A

Array-to-Array VM Migration

399
Q

When are Hot-On migrations useful?

A

Hot-On migration is useful in scenarios where a server or hypervisor is overloaded or requires maintenance and/or repair soon because it might be underperforming.

400
Q

When are concurrent VM migrations useful?

A

Concurrent migrations are useful for continuously optimizing VM placement across the entire IT environment.

401
Q

When is Hot-Suspended VM server-to-server migration useful?

A

Hot-Suspended Migration could be useful when a VM needs to be migrated from a failing server to another operational server.