CIS Test 2 Flashcards

(401 cards)

1
Q

Created from a physical machine or cluster.

A

Resource Pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A logical abstraction of aggregated physical resources that are managed centrally.

A

Resource Pool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must be done to resources in order to manage them centrally?

A

Resources must be POOLED to manage them centrally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Goals of Resource Management

A

Controls utilization of resources. Prevents VMs from monopolizing resources. Allocates resources based on relative priority of VMs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Process of allocating resources from physical machine or clustered physical machines to virtual machines (VMs) to optimize the utilization of resources.

A

Resource Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provides mouse, keyboard, and screen functionality.Sends power changes (on/off) to the virtual machine (VM).Allows access to BIOS of the VM.Typically used for virtual hardware configuration and troubleshooting issues.

A

Virtual Machine Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Makes a virtual machine portable across physical machines.

A

Standardized hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: All virtual machines have standardized hardware.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Enables storing VM files on a remote file server (NAS device).Client built into hypervisor.

A

Network File System (NFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cluster file system that allows multiple physical machines to perform read/write on the same storage device concurrently.Deployed on Fiber Channel (FC) and iSCSI storage apart from local storage.

A

Virtual Machine File System (VMFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two file systems supported by hypervisors

A

Virtual Machine File System (VMFS) - Network File System (NFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VM File Set

A

Configuration file - Virtual disk files - Virtual BIOS file - Virtual machine swap file - Log file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual Machine from a hypervisor’s perspective

A

A discrete set of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Machine from a user’s perspective

A

A logical compute system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hardware Assisted Virtualization

A

Achieved by using hypervisor-aware CPU to handle privileged instructions. Reduces virtualization overhead due to full and paravirtualization. CPU and memory virtualization support is provided in hardware. Enabled by AMD-V and Intel VT technologies in the x86 processor architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Product examples that implement paravirtualization

A

XenKVM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Only possible in an open operating system environment

A

Paravirtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Not possible in closed source OSs such as Microsoft Windows.

A

Paravirtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Guest OS knows that is is virtualized.Guest OS runs in Ring 0.Modified guest OS kernel is used, such as Linux and OpenBSD.Unmodified guest OSs, such as Microsoft Windows, are NOT supported.

A

Paravirtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Product examples of hypervisors that implement the full virtualization technique

A

VMware ESX/ESXi - Microsoft Hyper-V (running in a server core environment, not as a Windows application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

VMM runs in the privileged Ring 0.VMM decouples guest OS from the underlying physical hardware.Each VM is assigned a VMM.Guest OS is NOT aware of being virtualized.

A

Full Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Three techniques for handling privileged instructions to virtualize the CPU on x86 architectures

A

1) Full Virtualization using Binary Translation (BT) 2) Paravirtualization (OS-assisted Virtualization) 3) Hardware assisted Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Where most user applications run in x86 architecture

A

Ring 3 (least privileged)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where OS runs in x86 architecture

A

Ring 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Most privileged ring in x86 architecture
Ring 0
26
Four levels of privilege of the x86 architecture
Ring 0 - Ring 1 - Ring 2 - Ring 3
27
How is a traditional or typical OS designed?
To run on a bare-metal hardware platform and to fully own that hardware.
28
Challenges of virtualizing x86 hardware
Requires placing the virtualization layer below the OS layer. Is difficult to capture and translate privileged OS instructions at runtime.
29
Benefits of Compute Virtualization
Server Consolidation - Isolation - Encapsulation - Hardware Independence - Reduced Cost
30
Type of hypervisor most predominantly used within the Virtualized Data Center (VDC)
Type 1 Bare-Metal Hypervisor
31
Primary component of virtualization that enables compute system partitioning (i.e., partitioning of CPU and memory).
Hypervisor
32
Type of hypervisor installed and run as an application on top of an OS.Supports broadest range of hardware configurations.
Type 2 Hosted Hypervisor
33
Type of hypervisor that is directly installed on the x86 based hardware.Has direct access to the hardware resources.
Type 1 Bare-metal hypervisor
34
Two types of hypervisors
Type 1: Bare-metal hypervisor Type 2: Hosted hypervisor
35
What happens when a VM starts running?
Control is transferred to the Virtual Machine Monitor (VMM), which subsequently begins executing instructions from the VM.
36
Assigned to each VM and has a share of the CPU, memory, and I/O devices to successfully run the VM.
Virtual Machine Monitor (VMM)
37
Responsible for actually executing commands on the CPUs and performing Binary Translation.
Virtual Machine Monitor (VMM)
38
Abstracts hardware to appear as a physical machine with its own CPU, memory, and I/O devices.
Virtual Machine Monitor (VMM)
39
Designed specifically to support multiple virtual machines and to provide core functionalities, such as resource scheduling, I/O stacks, etc.
Hypervisor kernel
40
Functionality of a hypervisor kernel
Same functionality as other OSs, such as process creation, file system management, and process scheduling.
41
Two components of a hypervisor
1) Kernel 2) Virtual Machine Monitor (VMM)
42
Software that allows multiple OSs to run concurrently on a physical machine and to interact directly with the physical hardware.
Hypervisor
43
Technique of masking or abstracting the physical compute hardware and enabling multiple OSs to run concurrently on a single or clustered physical machine(s).
Compute Virtualization
44
Another name for the virtualization layer
Hypervisor
45
Layer which resides between hardware and VMs
Virtualization Layer
46
Logical entity that looks and behaves like a physical machine
Virtual Machine (VM)
47
First step towards building a cloud infrastructure
Virtualization
48
Which is the primary function of a hypervisor?a. Allows multiple OSs to run concurrently on a physical machine.b. Allows multiple OSs to run concurrently on a VM.c. Allows multiple file systems to run concurrently on a VM
a. Allows multiple OSs to run concurrently on a physical machine.
49
Which VMFS feature ensures that a VM is not powered on by multiple compute systems at the same time?a. On-power lockb. On-VM lockc. On-disk lockd. On-compute lock
c. On-disk lock
50
Which technology enables a physical CPU to appear as two or more logical CPUs?a. Hyper-threadingb. Multi-corec. Load balancingd. Ballooning
a. Hyper-threading
51
Which parameter determines the maximum amount of resource that a VM can consume?a. Shareb. Limitc. Reservationd. Priority
b. Limit
52
What is stored in a VM log file?a. Information of the VM's activitiesb. VM's RAM contentsc. VM's BIOS informationd. Information of the VM's configuration
a. Information of the VM's activities
53
Contained in the Virtual Machine configuration file
Number of CPUs, memory, number and type of network adapters, number and type of disks3.17
54
How does a large cache in a storage array improve performance?
A large cache in a storage array improves performance by retaining frequently accessed data for a longer period of time.
55
True or False: A policy may be applied to one or more previously defined storage groups.
TRUE
56
True or False: Tiering at the sub-LUN level moves more active data to faster drives and less active data to slower drives.
TRUE
57
True or False: Traditional storage tiering moves an entire LUN from one tier of storage to another.
TRUE
58
Configures data movement within a storage array (intra-array) or between storage arrays (inter-array).
Automated Storage Tiering
59
Each storage tier is optimized for what?
Each storage tier is optimized for a specific characteristic, such as performance, availability, or cost.
60
Thin LUNs are most appropriate for what type of applications?
Applications that can tolerate some variation in performance.
61
True or False: Adding drives to a Thin pool increases the available shared capacity for all the Thin LUNs in the pool.
TRUE
62
What happens to allocated capacity when Thin LUNs are destroyed?
Allocated capacity is reclaimed by the Thin pool when Thin LUNs are destroyed.
63
From the operating system's perspective, Thin LUNs appear as what?
As traditional LUNs
64
Provides more efficient utilization of storage reducing the amount of allocated, but unused physical storage.
Virtual Provisioning (Thin Provisioning)
65
Provides an abstraction layer, enabling clients to use a logical name that is independent of the actual physical location.
Namespace
66
How does global namespace in a file-level storage virtualization appliance simplify access to files?
Clients no longer need to have multiple points to access data located on different NAS devices.
67
Maps logical path of a file to the physical path names.
Global namespace
68
Enables clients to access files using logical names which are independent of the actual physical location.
Global namespace
69
Used to map the logical path of a file to the physical path name.
Global Namespace
70
File-level virtualization simplifies what?
File mobility
71
Implemented using global namespace.
File-level Storage Virtualization
72
Enables movement of files between NAS systems without impacting client access.
File-level Storage Virtualization
73
Eliminates dependencies between the file and its location.
File-level Storage Virtualization
74
How does a virtualization appliance handle extents?
The virtualization appliance aggregates extents and applies RAID protection to create virtual volumes.
75
True or False: Extents may be all of part of the underlying storage volume.
TRUE
76
Available capacity on a storage volume is used to create what?
Extents and virtual volumes
77
A device or LUN on an attached storage system that is visible to the virtualization appliance.
Storage volume
78
Takes a single large LUN from an array, slices it into smaller virtual volumes, and presents these volumes to the compute systems.
Block-level storage virtualization
79
What does block-level storage virtualization support?
1) Dynamic increase of storage volumes. 2) Consolidation of heterogeneous storage arrays. 3) Transparent volume access
80
Uses virtualization appliance to perform mapping operation.
Block-level Storage Virtualization
81
Makes underlying storage infrastructure transparent to compute.
Block-level Storage Virtualization
82
Enables significant cost and resource optimization.
Block-level Storage Virtualization
83
Creates an abstraction layer at the SAN, between physical storage resources and volumes presented to compute.
Block-level Storage Virtualization
84
Where is virtualization applied in NAS?
At the file level.
85
Where is virtualization applied in a SAN?
At the block level
86
True or False: Network-based storage virtualization can be implemented in both SAN and NAS environments.
TRUE
87
What manages an NFS volume?
The NFS volume is managed entirely by the NAS system.
88
When is RDM recommended?
1) When there is a large amount of data on the LUN in the storage system. 2) When it is not practical to move the data onto a virtual disk. 3) When clustering a virtual machine with a physical machine.
89
Contains a symbolic link on VMFS volume to the LUN; acts as a proxy that allows direct access to a LUN.
Raw Device Mapping
90
True or False: VMFS can be dynamically expanded without disrupting running VMs.
TRUE
91
Used for providing storage space for creating VMFS to store virtual machine files.
VMFS volume
92
What does VMFS provide to ensure that the same virtual machine is not powered on by multiple compute systems at the same time?
On-disk Locking
93
Hypervisor's native file system to manage VM files
Virtual Machine File System (VMFS)
94
Places very active parts of a LUN on high-performing Enterprise Flash Drives (EFDs).Places less active parts of a LUN on higher-capacity, more cost-effective SATA drives.Moves data at the extent group level.
Data movement at the sub-LUN level by EMC Symmetrix VMAX - FAST VP
95
Granularity with with FAST VP monitors data access
Each 7,680 KB region of storage
96
EMC FAST VP
Proactively monitors workloads at sub-LUN level in order to identify "busy" data that would benefit from being moved to higher-performing enterprise flash drives. Also identifies less "busy" data that could be moved to higher-capacity drives, without affecting the existing performance.
97
Automates the identification of Thin LUN extents for purposes of relocating application data across different performance / capacity tiers within an array.
EMC Symmetrix VMAX - FAST VP
98
Product that provides automated storage tiering for Thin pools.Supports data movement at sub-LUN level.Moves data based on user-defined policies and application performance needs.Data movement is automatic and non-disruptive.
EMC Symmetrix VMAX - FAST VP
99
True or False: EMC VPLEX has a unique clustering architecture that allows VMs at multiple data centers to have read/write access to shared block storage devices.
TRUE
100
Where does EMC VPLEX reside?
Between the compute and heterogeneous storage systems.
101
Adds support for data mobility and access over extended asynchronous distances (beyond 100 km).
EMC VPLEX Geo
102
Only platform (as of late 2012) that delivers both local and distributed federation in a storage virtualization context.
EMC VPLEX
103
Three deployment models of EMC VPLEX
1) VPLEX Local 2) VPLEX Metro 3) VPLEX Geo
104
EMC VPLEX
Next generation solution for non-disruptive data mobility and information access within, across and between VDCs. Allows VMs at multiple VDCs to access the shared block storage device. Resides between compute and heterogeneous storage systems, virtualizing data movement. Offers three deployment models.
105
Automates the identification of active or inactive data to relocate them to different performance / capacity tiers between the arrays.
Inter-Array Automated Storage Tiering
106
Benefits of Cache Tiering
1) Provides excellent performance benefit during peak workload. 2) Non-disruptive and transparent to applications.
107
Creates a large capacity secondary cache using SSDs.Enables tiering between DRAM cache and SSD drives (secondary cache).Most reads are now served directly from high performance tiered cache.
Cache Tiering
108
Manage data movement across storage types in an automated storage tiering context.
Policies (a.k.a., tier usage rules)
109
A logical collection of LUNs that are to be managed together.
Storage Groups
110
Combination of drive technology (SSD, FC, or SATA) and a RAID protection type.
Storage Type
111
Three major building blocks of automated storage tiering
1) Storage Type 2) Storage Groups 3) Policies
112
True or False: Movement of data with much finer granularity (e.g., 8MB) greatly enhances the value proposition of automated storage tiering.
TRUE
113
Enables a LUN to be broken down into smaller segments and tiered at that level.
Sub-LUN Tiering
114
Automates the storage tiering process within an array.Enables efficient use of SSDs and SATA drive technologies.Performs data movements between tiers at sub-LUN level.Employs cache tiering to improve application performance further.
Intra-Array Automated Storage Tiering
115
Automated Storage Tiering
Automates the storage tiering process. Enables the non-disruptive data movement between tiers. Improves application performance at the same cost or provides the same performance at a lower cost. Configures data movement within a storage array (intra-array) or between storage arrays (inter-array).
116
In a storage tiering context, policies may be based on what factors?
File type, frequency of access, etc.
117
Efficient storage tiering requires implementation of what?
Policies
118
Storage Tiering Implementation Types
Manual storage tiering - Automated storage tiering
119
Establishing a hierarchy of storage type, and identifying the candidate data to relocate to the appropriate storage type to meet service level requirements at minimal cost.
Storage Tiering
120
True or False: For applications demanding higher service levels, traditional LUNs on RAID groups are a more suitable choice than virtual provisioning.
TRUE
121
Virtual Provisioning Best Practices
1) Drives in Thin pool should have the same RPM. 2) Drives in the Thin pool should be of the same size. 3) Provision Thin LUNs for applications that can tolerate some variation in performance.
122
Virtual Provisioning Benefits
1) Reduces administrative overhead. 2) Improves capacity utilization. 3) Reduces cost. 4) Reduces downtime.
123
Thin Disk Provisioning
Hypervisor allocates storage space to the virtual disk only when the VM requires storage space. Eliminates the allocated, but unused storage capacity at the virtual disk. Eliminates the need to overprovision virtual disks.
124
Thick disk provisioning
Entire provisioned space is committed to the virtual disk
125
Two options for provisioning storage to virtual disk offered by the hypervisor
1) Provisioning thick disk 2) Provisioning thin disk
126
How is virtual provisioning done at the compute level?
Hypervisor performs virtual provisioning to create virtual disks for VMs.
127
Benefit of Thin Pool Rebalancing
Enables spreading out the data equally on all the physical disk drives within the Thin Pool, ensuring that the used capacity of each disk drive is uniform across the pool.
128
Restripes data across all the disk drives (both existing and new disk drives) in the thin pool.
Thin Pool Rebalancing
129
Provides the ability to automatically rebalance allocated extents on physical disk drives over the entire pool when new drives are added to the pool.
Thin Pool Rebalancing
130
Balances the used capacity of physical disk drives over the entire pool when new disk drives are added.Restripes data across all disk drives.
Thin Pool Rebalancing
131
How is a Thin Pool created?
By specifying a set of drives and a RAID type for that pool. Thin LUNs are then created out of that pool (similar to traditional LUN created on a RAID group).
132
True or False: Drives can be added to a Thin Pool while the pool is being used in production.
TRUE
133
True or False: Multiple thin pools may be created within a storage array.
TRUE
134
Collection of physical drives that provide the actual physical storage used by Thin LUNs.Can be expanded dynamically.
Thin Pool
135
From what is physical storage allocated to the Thin LUN?
Thin Pool
136
Minimum amount of physical storage allocated at a time to a Thin LUN from a Thin Pool
Thin LUN Extent
137
Logical device where the physical storage need not be completely allocated at the time of creation.Seen by the OS as a traditional LUN.Best suited for environments where space efficiency is paramount.
Thin LUN
138
Basic benefit of virtual provisioning
Better storage capacity utilization
139
Ability to present a logical unit (Thin LUN) to a compute system, with MORE capacity than what is physically allocated to the LUN on the storage array.
Virtual Provisioning
140
Capacity-on-demand from a shared storage pool, called Thin pool.Physical storage is allocated only when the compute requires it.
Virtual Provisioning (Thin Provisioning)
141
Where Virtual (Thin) provisioning may be implemented
Storage layer - Compute layer: virtual provisioning for virtual disk
142
Ability to present a LUN to a compute system with MORE capacity than what is physically allocated to the LUN.
Virtual Provisioning (Thin Provisioning)
143
Benefits of global namespace
By bringing multiple file systems under a single namespace, global namespace provides a single view of the directories and files. Provides administrators a single control point for managing files.
144
Provides an abstraction layer in the NAS / File servers environment.
File-level Storage Virtualization
145
File-Level Storage Virtualization - Global Namespace
Enables clients to access files using logical names which are independent of the actual physical location. Maps logical path of a file to the physical path names. Simplifies access to files: clients no longer need to have multiple mount points to access data located on different NAS devices.
146
Mechanisms used by a virtualization appliance to divide storage volumes.May be all or part of the underlying storage volume.Aggregated by the virtualization appliance and subjected to RAID protection to create virtual volumes.Vendor-specific terminology
Extents
147
Encapsulates physical storage devices and applies layers of logical abstraction to create virtual volumes.
Virtualization appliance
148
True or False: Block-level storage virtualization enables the combination of several LUNs from one or more arrays into a single virtual volume before presenting it to the compute system.
TRUE
149
Role of the virtualization appliance in block-level storage virtualization
Performs mapping between the virtual volume and the LUNs on the array.
150
Block-level Storage Virtualization
Creates an abstraction layer at the SAN, between physical storage resources and volumes presented to compute. Uses virtualization appliance to perform mapping operation. Makes underlying storage infrastructure transparent to compute. Enables significant cost and resource optimization.
151
Facilitates an Information Lifecycle Management (ILM) strategy
Deploying block-level storage virtualization in a heterogeneous arrays environment.
152
Enables non-disruptive data migration between arrays.
Network-based virtualization
153
Provides ability to pool heterogeneous storage resources.Performs non-disruptive data migration.Manages a pool of storage resources from a single management interface.
Network-based virtualization
154
How network-based storage virtualization is applied
Block-level (SAN) - File-level (NAS)
155
Embeds storage virtualization intelligence at the network layer.
Network-based virtualization
156
Created on a NAS device.Provides storage to VM.Accessed by multiple compute systems simultaneously.
NFS Volumes
157
True or False: Hypervisors come with NFS client software for NFS server (NAS) access.
TRUE
158
Used by the hypervisor to access the NAS file system
NFS protocol
159
In Raw Device Mapping, what file on the VMFS volume is used?
Mapping File
160
Benefits of Raw Device Mapping
1) Provides solution when huge volume of data on LUN is not practical to move onto a virtual disk. 2) Enables clustering the VM with the physical machine.
161
When is Raw Device Mapping (RDM) useful?
RDM is useful when the applications running on the VMs are required to know the physical characteristics of the storage device.
162
Enables VM to directly access LUNs in a storage system.
Raw Device Mapping (RDM)
163
Methods to expand VMFS
1) Expand VMFS dynamically on the volume partition on which it is located. 2) Add one or more LUNs to the source VMFS volume.
164
Characteristics of VMFS
Hypervisor's native file system to manage VM files. Cluster File System - can be access by multiple compute systems simultaneously for reads and writes; Provides on-disk locking. Uses a VMFS volume to store VM files.
165
Two file systems used by the hypervisor to manage the VM files
1) Virtual Machine File System (VMFS) - the hypervisor's native file system 2) Network File System (NFS) such as NAS file system
166
How does a virtual disk appear to a VM?
As a local physical disk drive.The hypervisor may access a FC storage device, IP storage devices such as iSCSI, and NAS devices.
167
VM remains unaware of what?
Total space available to the hypervisor. Underlying storage technologies.
168
How are VMs stored?
As a set of files on storage space available to the hypervisor.
169
Examples of storage virtualization at the storage layer
Virtual provisioning - Automated storage tiering
170
Examples of storage virtualization at the network layer
Block-level virtualization - File-level virtualization
171
Example of storage virtualization at the compute layer
Storage provisioning for VMs.
172
Benefits of Storage Virtualization
Adds or removes storage without any downtime.Increases storage utilization thereby reducing TCO. Provides non-disruptive data migration between storage devices. Supports heterogeneous, multi-vendor storage platforms. Simplifies storage management.
173
How is storage virtualization created and assigned?
Virtual volumes are created from the storage pools and are assigned to the compute system.
174
Performs logical to physical storage mapping.Abstracts the identify of physical storage devices.Creates a storage pool from multiple, heterogeneous storage arrays.
Virtualization layer
175
Process of masking the underlying complexity of physical storage resources and presenting the logical view of these resources to compute systems.
Storage Virtualization
176
What defines the minimum amount of physical storage allocated at a time to a thin LUN from a thin pool?a. Thin LUN extentb. Thin LUN capacityc. Thin LUN factord. Thin LUN set size
a. Thin LUN extent
177
When is a thin LUN preferred over a traditional LUN?a. Performance is predominant.b. Security is more important.c. Storage space efficiency is paramount.d. High availability is predominant.
c. Storage space efficiency is paramount.
178
What is used to create secondary cache in a cache tiering mechanism?a. DRAMb. FC drivec. Solid state drived. SATA drive
c. Solid state drive
179
What are the three major building blocks of automated storage tiering?a. RAID type, storage type, policiesb. Storage type, storage group, policiesc. Storage group, RAID group, storage typed. Storage group, RAID group, group policy
b. Storage type, storage group, policies
180
Which method enables a VM to directly access a LUN on a storage array?a. File system lockingb. VM clusteringc. Raw device mappingd. Virtual storage mapping
c. Raw device mapping
181
Enables guaranteed service levels when traffic from multiple virtual networks share physical network resources.Sets priority for bandwidth allocation to different types of traffic.
Resource sharing without contention
182
Allows using a policy for distribution of traffic across VMs and network links.Allows using a policy for traffic failover across network links.
Policy-based management
183
Technique to distribute workload across multiple physical or virtual machines and parallel network links to prevent overutilization or underutilization of these resources and to optimize performance.
Load balancing
184
Key objective in managing network traffic
Load balancing
185
How does the hypervisor kernel recognize a CNA?
As a NIC and a FC HBA
186
Provides connection to hypervisor kernel and directs hypervisor traffic: management, storage, and VM migration.
Virtual Switch
187
Provides connection to virtual NICs and forwards VM traffic.
Virtual Switch
188
Virtualized to create virtual networks (e.g., VLAN, VSAN).
VM and physical networks
189
Resides inside physical server.
Virtual Machine (VM) Network
190
Provides connectivity to a hypervisor kernel.
Virtual Machine (VM) Network
191
Provides connectivity among VMs INSIDE a physical server.
Virtual Machine (VM) Network
192
Consists of logical switches called "virtual switches".
Virtual Machine (VM) Network
193
Connectivity provided by physical networks
1) Among physical servers running hypervisors. 2) Between physical servers and clients. 3) Between physical servers and storage systems.
194
A physical network consists of what physical components?
1) Network adapters (NICs) 2) Switches 3) Routers 4) Bridges 5) Repeaters 6) Hubs
195
Enforces routing for communication between virtual networks.
Network Virtualization
196
Enables functional grouping of nodes in a virtual network.
Network Virtualization
197
Allows communication between nodes in the same virtual network without routing or frames.
Network Virtualization
198
Technology that defines how multiple virtual servers can share a single physical Fibre Channel port identification (ID).
N_Port ID virtualization (NPIV)
199
Allows a single HBA or target port on a storage array to register multiple World Wide Port Names (WWPNs) and N_Port identification numbers.
N_Port ID Virtualization (NPIV)
200
PowerPath/VE Features
Dynamic Load Balancing - Automated Performance Optimization - Dynamic Path Failover - Wide Variety of Storage Array Support - Automatic Path Testing - Monitoring and Alerting
201
Operation of EMC PowerPath/VE
Added to the hypervisor kernel. All I/Os to storage run through PowerPath/VE, which distributes I/O requests to a LUN across all the available paths.
202
Provides a multipathing solution for VMware ESX/ESXi and Microsoft Hyper-V.Delivers advanced multipathing compared to hypervisor's native multipathing.
EMC PowerPath/VE
203
Controls multiple VEMs as one distributed virtual switch/
Cisco Nexus 1000V Virtual Supervisor Module (VSM)
204
What is the VSM?
VSM is the Cisco NX-OS network operating system running on a VM.
205
Where does the Nexus 1000V's Virtual Supervisor Module (VSM) run?
Cisco NX-OS network OS running in a VM.
206
Nexus 1000V component which controls multiple VEMs as one distributed virtual switch.
Virtual Supervisor Module (VSM)
207
Nexus 1000V component that runs inside the hypervisor and replaces the hypervisor's virtual switch functionality.
Virtual Ethernet Module (VEM)
208
Two components of Cisco Nexus 1000V
1) Virtual Ethernet Module (VEM) 2) Virtual Supervisor Module (VSM)
209
Cisco's third-party distributed virtual switch for VMware ESX/ESXi.Separates VDC and compute administration.
Cisco Nexus 1000V
210
Provides the capability to recognize an alternate I/O path to a LUN and enables failover.
Multipathing
211
Process of detecting a failed path and rerouting I/O to another path.
Path Failover
212
Built into hypervisor or provided by third-party.Recognizes alternate I/O path to a LUN and enables failover.Performs load balancing by distributing I/o to all available paths.
Multipathing
213
Technique allowing a physical server to use multiple physical paths for transferring data between the physical server and a LUN on a storage system.
Multipathing
214
What happens if a burst exceeds the configured burst size?
Remaining frames will be queued for later transmission. If the queue is full, the frame will be dropped.
215
Where traffic shaping can be enabled and configured
At the virtual switch / distributed virtual switch or at the port group level.
216
Max amount of data allowed to transfer in a burst.Bandwidth x time
Burst Size
217
Traffic that exceeds the average bandwidth
Burst
218
Max data transfer rate without queuing / dropping frames
Peak bandwidth
219
Data transfer rate allowed over time.Workload at a switch port can intermittently exceed this.
Average bandwidth
220
Three traffic shaping parameters
Average bandwidth - Peak bandwidth - Burst size
221
Controls network bandwidth at virtual / distributed virtual switch or port group.Prevents impact on business-critical application traffic by non-critical traffic flow.
Traffic Shaping
222
Improve service levels for critical applications.
Limit and Share
223
Configurable parameters at a distributed virtual switch.Configured to control different types of network traffic, competing for a physical NIC or NIC team.Ensure that business critical applications get required bandwidth.
Limit and Share
224
Specifies relative priority for allocating bandwidth to different traffic types.Is specified as numbers.Applies to a physical NIC.
Share
225
Sets limit on maximum bandwidth per traffic type (traffic type will not exceed limit).Specified in Mbps.Applies to a NIC team.
Limit
226
Allows associating policies for load balancing and failover at a virtual switch or a port group.
NIC teaming
227
Allows distribution of all outbound network traffic across active physical NICs.
Load balancing
228
Logically groups physical NICs connected to a virtual switch
NIC Teaming
229
True or False: With Storm Control, a switch port blocks traffic if threshold is reached and drops the subsequent frames over the next time interval.
TRUE
230
Example of software-based load balancer
Microsoft Network Load Balancing
231
True or False: The real IP addresses of the servers are known only to the load balancing device, which decides where to forward the request.
TRUE
232
Three Load Balancing Policies
Round Robin - Weighted Round Robin - Least Connections
233
7 Key Network Traffic Management Techniques
1. Balancing client workload: Hardware based 2. Balancing client workload: Software based 3. Storm control 4. NIC teaming 5. Limit and share 6. Traffic shaping 7. Multipathing
234
Three Requirements for Network Traffic Management
1) Load Balancing 2) Policy-based Management 3) Resource sharing without contention
235
Use of FCoE in a CDC
FCoE facilitates the convergence of the LAN and FC SAN traffic over a single Ethernet infrastructure.
236
Restriction on VLANs configured for VSANs
VLANs configured for VSANs should not be used for LAN traffic.VLAN must be unique for each VSAN.
237
What converges VLAN and VSAN?
Fiber Channel over Ethernet (FCoE) - Requires a VLAN for each VSAN.
238
Fabric Services
Name Server - Zoning
239
True or False: A VSAN has its own fabric services (name server, zoning), configuration, and set of FC addresses.
TRUE
240
A logical fabric on an FC SAN that enables communication among a group of nodes, regardless of their physical location in the fabric.
Virtual Storage Area Network (VSAN)
241
What has to happen for a VM to be connected to multiple VLANs?
The guest OS running on the VM must support VLAN trunking.
242
Process of inserting or removing a marker (tag) with VLAN-specific information (VLAN ID) into the Ethernet frame.
VLAN Tagging
243
Benefits of VLAN Trunking
Eliminates the need for dedicated network link(s) for each VLAN. Reduces inter-device links when the devices have more than one VLAN. Reduces the number of virtual NICs, storage ports, and switch ports. Reduces management complexity.
244
Mechanism to achieve VLAN trunking
VLAN tagging
245
A technology that allows traffic from multiple VLANs to traverse a single network connection.
VLAN Trunking
246
Can a VM or storage system be a member of multiple VLANs?
Yes.Requires support of respective OS.
247
When does a node become a VLAN member?
When connected to VLAN ports
248
Process for configuring a VLAN
1. Define VLAN IDs on physical switch. 2. Choose necessary VLAN IDs from the hypervisor's built-in VLAN ID pool, required for virtual switches. 3. Assign VLAN ID to physical or virtual switch port, to include switch ports to a VLAN and to enable grouping of switch ports into VLANs.
249
Most common technique to assign VLAN IDs to switch ports in a VDC environment
Port-based VLAN
250
Techniques to assign VLAN IDs to switch ports
1) Port-based VLAN 2) MAC-based VLAN 3) Protocol-based VLAN 4) Policy-based VLAN
251
Benefits of VLANs
1) Controls broadcast activity and improves network performance. 2) Simplifies management. 3) Increases security levels. 4) Provides higher utilization of switch and reduces CAPEX.
252
A logical network, created on a LAN or across LANs consisting of physical and virtual switches, enabling communication among a group of nodes, regardless of their location in the network.
VLAN
253
True or False: The hypervisor kernel has a built-in software iSCSI initiator.
True. This software initiator is used to perform iSCSI processing when hypervisor accesses the iSCSI storage via physical NICs.
254
iSCSI HBA
Transfers hypervisor storage I/Os (SCSI I/Os) to iSCSI storage systems. Has built-in iSCSI initiator. Encapsulates SCSI I/O into iSCSI frames and then encapsulates iSCSI frames into Ethernet frames.Uses its own MAC and IP addresses for transmission of Ethernet frames over the Ethernet network. Offloads iSCSI processing (SCSI to iSCSI) from hypervisor.
255
Hypervisor recognizes it as an FC HBA and as a NIC.NIC: Used as a link between virtual and physical switches.FC HBA: Provides hypervisor access to the FC storage.
Converged Network Adapter (CNA)
256
Transfers hypervisor storage I/Os (SCSI I/Os) to FC storage systems.Encapsulates SCSI data into FC frame.Uses its own FC address for transmission of frames over FC network.
FC HBA
257
How does a PNIC handle Ethernet frames?
Ethernet frames are transferred through physical NICs without modification.
258
True or False: Physical NICs are not addressable from the network.
True.IP address not assigned to a PNIC (prohibits OSI Layer 3 access). MAC addresses not available (prohibits OSI Layer 2 access).
259
Used as inter-switch links (ISLs) between virtual and physical Ethernet switches.
Physical NICs (PNICs)
260
Distributed Virtual Switch Benefits
1) Centralizes VM network management. 2) Maintains network policies during VM migration - allows movement of port group policies with VM.
261
Aggregation of multiple virtual switches distributed across multiple physical servers
Distributed Virtual Switch
262
VMs connected to a VM port group share what?
Common configuration
263
Policy Examples
Security - Load balancing and failover across PNICs - Limiting network bandwidth for VMs - Virtual LAN assignment to a VM port group to transfer the VM traffic.
264
Mechanism for applying uniform network policy settings to a group of VM ports
VM Port Group
265
Virtual switch port which provides connectivity to hypervisor kernel
Hypervisor kernel port
266
Virtual switch port which provides connectivity to virtual NICs
VM port
267
Virtual switch port which provides connectivity to physical NIC
Uplink port
268
Types of Virtual Switch Ports
1) Hypervisor kernel ports 2) VM ports 3) Uplink ports
269
Are physical NICs shared between virtual switches?
No.
270
How are frames transferred between virtual switches?
Through VMs
271
True or False: There is no direct connection between virtual switches within a compute system.
TRUE
272
Example scenario for a virtual switch that connects to no physical NIC.
A virtual switch connecting a VM running a firewall application to another VM protected by the firewall.
273
What does a virtual switch do if it has no connection to a physical NIC?
If the virtual switch has no connection to a physical NIC, it directs VM traffic WITHIN the physical server.
274
True or False: A virtual switch has no control over inbound traffic. Load balancing and failover of inbound traffic is performed by supported physical switches that are connected to the virtual switch via physical NICs.
TRUE
275
True or False: A virtual switch may connect to multiple physical NICs, supporting load balancing and failover.
TRUE
276
A logical Layer 2 switch that supports Ethernet protocol.Resides inside a physical server.Is created and configured by / through the hypervisor.Maintains MAC address table for frame forwarding.Directs network traffic to / from VMs and hypervisor kernel.
Virtual Switch
277
True or False: In the absence of virtual HBA, VMs share the WWN identity of a physical HBA or CNA to access RDM disks. There is no option to uniquely secure and manage storage for an individual VM.
TRUE
278
True or False: A VM with a virtual HBA is recognized as a node in the fabric, allowing an administrator to restrict access to specific LUNs to specific VMs using zoning and LUN masking.
TRUE
279
Leverages NPIV to instantiate virtual N_ports.Assigns the virtual N_ports to the VMs.
Hypervisor kernel
280
Enables a VM to access FC RDM disk / LUN assigned to the VM.Configured using N_Port ID Virtualization (NPIV) technology.Enables zoning and LUN masking at the VM level.
Virtual HBA
281
What generates the MAC addresses and allocates a MAC address to a virtual NIC at the time of VM creation?
Hypervisor
282
Connects VMs to virtual switch.Forwards Ethernet frames to virtual switch.Has unique MAC and IP addresses.Supports Ethernet standards similar to physical NIC.
Virtual NIC (VNIC)
283
Provides the connection between a virtual switch and a physical FCoE switch.
Converged Network Adapter (CNA)
284
Traffic type between hypervisor kernel and CNA
FC storage
285
Traffic types between FC / iSCSI HBA and physical switch (FC/Ethernet)
FC or iSCSI storage
286
Provide a link between the virtual and physical switches.Forwards VM and hypervisor kernel traffic between the switches.
Physical NICs (PNICs)
287
Traffic types between hypervisor kernel and virtual switch
Management - IP Storage - VM Migration
288
Traffic types between PNIC and physical switch
VMManagement - IP Storage - VM Migration
289
Forms physical network that supports Ethernet / FC / iSCSI / FCoE.Provides connections among physical servers, between physical servers and storage systems, and between physical servers and clients.
Physical switch, router
290
Connects physical servers to physical network.Forwards VM and hypervisor traffic to / from physical network.
Physical adapter: NIC, HBA, CNA
291
An Ethernet switch that forms the VM network.
Virtual Switch
292
Enables a VM to access Fibre Channel (FC) RDM disk / LUN assigned to the VM
Virtual HBA
293
Connects VMs to the VM network.Sends / receives VM traffic to / from the VM network.
Virtual NIC
294
Components of VDC Network Infrastructure
Virtual NICVirtual HBAVirtual Switch-------------------Physical Adapter (NIC, HBA, CNA) - Physical switch, router
295
Benefits of Network Virtualization
1) Enhances security 2) Enhances performance 3) Improves manageability 4) Improves utilization and reduces CAPEX
296
Hypervisor (as a network virtualization tool)
Uses built-in networking and network virtualization functionalities to create virtual switches and configuring virtual networks on the virtual switches. Alternatively, uses third-party software for providing networking and network virtualization functionalities. Third-party software is installed on it and replaces the native networking functionality
297
Network Virtualization Tools
1) Physical switch's Operating System (OS) 2) Hypervisor
298
True or False: VM and physical networks are virtualized to create virtual networks, for example: virtual LAN, virtual SAN.
TRUE
299
Resides INSIDE a physical server.Consists of logical switches called virtual switches.Provides connectivity among VMs inside a physical server.Provides connectivity to Hypervisor kernel.Connects to physical network via PNIC.
Virtual Machine (VM) Network
300
Involves virtualizing physical and virtual machine networks.
Network Virtualization in the VDC
301
Network Virtualization
Enables virtual networks to share network resources. Allows communication between nodes in the same virtual network without routing or frames. Enforces routing for communication between virtual networks. Restricts management traffic, including "Network Broadcast", from propagating to other virtual networks. Enables functional grouping of nodes in a virtual network.
302
Process of logically segmenting or grouping physical network(s) and making them operate as single or multiple independent network(s) called "Virtual Network(s)".
Network Virtualization
303
Which describes N_Port ID Virtualization?a. Single physical FC HBA port functions as multiple virtual N_ports b. Single physical FC HBA port functions as multiple virtual E_portsc. Single virtual FC HBA port functions as multiple physical N_ports
a. Single physical FC HBA port functions as multiple virtual N_ports
304
What is enabled by using NIC teaming?a. Balance traffic across physical servers.b. Allocate bandwidth to traffic based on priority.c. Failover to another available physical NIC in the event of a physical NIC failure.
c. Failover to another available physical NIC in the event of a physical NIC failure.
305
Which technique allows traffic from multiple VLANs to traverse over a single network connection?a. NIC teamingb. Multipathingc. Port Groupd. Trunking
d. Trunking
306
Which network parameter sets maximum data transfer rate across a VM port group without queuing or dropping frames?a. Burst sizeb. Peak bandwidthc. Shared. Limit
b. Peak bandwidth
307
Which is a benefit of network virtualization?a. Enhanced storm controlb. Increased resource acquisitionc. Improved manageabilityd. Better policy control
c. Improved manageability
308
Example of when a connection broker might not be needed.
When a organization dedicates VMs to each user.
309
Example of when a connection broker would be needed.
With VM pools.
310
True or False: A VM pool shares VMs for concurrent use by many users.
TRUE
311
True or False: Each VM may be dedicated to a specific user or allocated in a pool.
True.
312
Breaks the dependency between the application and the underlying platform that includes OS and hardware.
Application Virtualization
313
When is a connection broker a mandatory component of VDI architecture?a. When desktop VMs are assigned from VM pool.b. When high-end graphic applications are usedc. When additional security is required.
a. When desktop VMs are assigned from VM pool. Generally speaking, a connection broker would be needed with VM pools.
314
What is true about application streaming?a. Requires no agent at client machine.b. Requires a locally installed agent on the client machine and a built-in agent on the application.c. Requires a locally installed agent on the client machine.
c. Requires a locally installed agent on the client machine.
315
What is true about application encapsulation?a. Requires a locally installed agent on the client machine.b. Requires a built-in agent at the remote server.c. Does not rely on software installation or underlying OS.
c. Does not rely on software installation or underlying OS.
316
What correctly describes application virtualization?a. Encapsulates OS resources and the application.b. Increases application and CPU utilization.c. Provides interoperability between different application versions.
a. Encapsulates OS resources and the application.
317
VMware product used for the management of the virtualization platform
vCenter
318
VMware solution that provides storage optimization to reduce storage requirements and to simplify desktop management.
VMware View Composer
319
VMware solution that provides centralized management and brokering of connections to desktops in the data center.
VMware View Manager
320
VMware ThinApp
VMware application virtualization solution that links the app, Virtual OS (VOS), file system, and registry into a single package. Enables apps to run directly from storage devices such as USB or network share. Packages entire app and its settings into an executable file that is isolated from the desktop OS.
321
Three Benefits of Application Virtualization
1) Simplified application deployment / retirement: apps are not installed. 2) Simplified operating system image management: apps are completely separate from OS; OS patches and upgrades do not affect the applications. 3) Elimination of resource conflicts: apps have their own virtual OS resources.
322
Application Streaming
Application specific data / resources are transmitted to the client device when the application is executed. Minimum amount of data (~10 to 30% of total app) is delivered to the client. Additional application features are delivered on demand. Locally installed agents are required to run virtualized application.
323
Application is converted into a self-contained package.Application packages may run from USB, CD-ROM or local disk,Built-in agents are present within the package.
Application Encapsulation
324
Two Application Virtualization Deployment Methods
1) Application Encapsulation 2) Application Streaming
325
Aggregates OS resources and the application into a virtualized container.
Application Virtualization
326
Allows an application to be delivered in an isolated environment.
Application Virtualization
327
Technique of presenting an application to an end user without any installation, integration, or dependencies on the underlying computing platform.
Application Virtualization
328
Stores user's data and settings in a central location
User state virtualization
329
Two Benefits of User State Virtualization
1) Easier migration of user state during OS refresh / migration. 2) Makes data available to user regardless of endpoint device.
330
Enabling technology for implementing desktop virtualization
User state virtualization
331
Includes user's data as well as application and OS configuration settings.
User State
332
Three Considerations With A Move to VDI
1) Reliance on network connection 2) Unsuitable for high-end graphics applications 3) Requires additional infrastructure
333
Three Benefits of VDI
1) Centralized deployment and management 2) Improved security 3) Improved business continuity and disaster recovery
334
Responsible for establishing and managing the connection between the endpoint device and the desktop VM.
Connection Broker
335
True or False: When provisioning a VM on a VM Hosting Server, a template or image may be used as a basis for the creation of the VM, settings, and disk.
TRUE
336
Responsible for hosting the desktop VMs that are remotely delivered to the endpoint devices.
VM Hosting Servers
337
Three VDI Components
1) Endpoint Devices 2) VM Hosting / Execution Servers 3) Connection Broker
338
Another term for a server-hosted desktop virtualization solution approach
Virtual Desktop Environment (VDE)
339
Each desktop has its own OS and applications installed.User has full access to resources of virtualized desktop.
Virtual Desktop Infrastructure (VDI)
340
Involves hosting a desktop which runs as a VM on a server in a VDC.
Virtual Desktop Infrastructure (VDI)
341
Four Benefits of RDS
1) Rapid Application Delivery 2) Improved Security 3) Centralized Management 4) Low-cost Technology When Compared to VDI
342
In RDS, where does resource consumption take place?
On the server
343
A terminal service runs on top of what?
a Windows installation
344
RDS is traditionally known as what?
Terminal services
345
Two Desktop Virtualization Techniques
1) Remote Desktop Services (RDS) 2) VIrtual Desktop Infrastructure (VDI)
346
Five Benefits of Desktop Virtualization
1) Enablement of Thin Clients 2) Improved Data Security 3) Simplified Data Backup 4) Simplified PC Maintenance 5) Flexibility of Access
347
Objective of desktop virtualization technology
Centralize the PC OS at the data center.
348
Enables organizations to host centrally manage desktops.Desktops run as VMs within the VDC.Endpoint devices may be thin clients or PCs.
Desktop Virtualization
349
Technology which enables detachment of the user state, the OS, and the applications from endpoint devices.
Desktop Virtualization
350
Desktop Virtualization Drivers
1) Manageability Concerns 2) Security Concerns 3) Cost Concerns
351
Isolate hardware from OS, application and user state
Desktop Virtualization
352
Isolate the application from OS and hardware
Application Virtualization
353
Example of a case where a connection broker would NOT be needed in a VDI architecture
When an organization dedicates VMs to each user.
354
What is true about VDI?a. Involves hosting desktop which runs as hypervisor on the server.b. Requires hypervisor based VDI agent support.c. Each desktop has its own OS and applications in a VM on a server.
c. Each desktop has its own OS and applications in a VM on a server.
355
Backup Considerations in a VDC
1) Reduced computing resources 2) Complex VM configurations
356
Single Points of Failure in a VDC
SPOF in Compute InfrastructureSPOF in Storage InfrastructureSPOF in Network InfrastructureSite
357
Which is used as a master copy to create and provision a new VM?a. VM templateb. VM snapshotc. VM cloned. VM backup
a. VM Template
358
What describes the state of virtual disks of a VM after an array to array migration a. Virtual disks are maintained at both primary and secondary sites.c. Virtual disks are deleted from the primary site after they are copied to the secondary site.
c. Virtual disks are deleted from the primary site after they are copied to the secondary site.
359
What occurs to the guest OS configuration when a VM is reverted from it snapshot?a. Guest OS configurations are reverted to the point-in-time of snapshot creation.b. Current guest OS configurations are preserved.
a. Guest OS configurations are reverted to the point-in-time of snapshot creation.
360
Which is true about VM fault tolerance mechanism?a. Both primary and secondary VMs share the same virtual disks.b. Both primary and secondary VMs have separate virtual disks.c. Only primary VM can access the shared virtual disk.
a. Both primary and secondary VMs share the same virtual disks.
361
What is an advantage of an image based backup approach?a. Single pass information collectionb. Reduced RPOc. Eliminate site failuresd. Reduced VM failures
a. Single pass information collection
362
Provides advanced VM-level and application-level consistent backup.
EMC Data Domain
363
Provides cost-effective bi-directional replication for DR.
EMC Data Domain
364
Offers consolidation of server backup and archive data to a single storage system for optimized virtualization.Reduces redundant data across VMware data backups.
EMC Data Domain
365
Addresses the challenge of extra storage and backup resources in VMware based virtualized environments, and accelerates VMware backups by 90%.
EMC Data Domain
366
Target based deduplication and storage solution
EMC Data Domain
367
True or False: EMC Avamar can perform backups securely over LAN/WAN using encryption at-rest or in-flight.
TRUE
368
True or False: With EMC Avamar, data is deduplicated at the source before transferring across the network, thereby reducing network bandwidth for backup by 99%.
TRUE
369
Employs RAIN architecture for HA and reliability
EMC Avamar
370
Provides global source side deduplication at sub-file level, across sites and servers (physical as well as virtual).Reduces network bandwidth for backup by 99%.
EMC Avamar
371
True or False: EMC Avamar provides single-step recovery of individual files or complete VMDK images to the original VM or a new VM.
TRUE
372
Backup levels of EMC Avamar
1) Guest OS level 2) VM image level
373
EMC solution offering optimized solutions for protecting VMware environments
EMC Avamar
374
EMC deduplication and backup software system
EMC Avamar
375
3 Key Features of VMware Storage vMotion
1) Zero downtime migrations with complete transaction integrity. 2) Complete OS and hardware independence. 3) Broad support for live migration of VM disk files across any FC SAN, iSCSI SAN, and NFS storage system supported by vSphere.
376
Enables live migration of VM disk files across storage arrays.Provides relocation of VM disk files between and across shared storage locations.
VMware Storage vMotion
377
4 Key Features of VMware vMotion
1) Multiple concurrent migrations to continuously optimize VM placement across the entire VDC environment. 2) VMware DRS underpinning, which continuously monitors the pooled resources of many servers. 3) Intelligently allocates available resources among VMs based on predefined rules that reflect business needs and changing priorities. 4) Faster and reliable recovery of VMs in the event of a server failure.
378
Migrates VMs running any OS across any type of hardware and storage.
VMware vMotion
379
4 Key Features of VMware FT
1) Automatically triggers seamless failover when the protected VMs fail to respond, resulting in zero downtime, zero data loss, and continuous availability. 2) Automatically triggers the creation of a new secondary VM after failover to ensure continuous protection to the application. 3) Compatible with all types of shared storage (e.g., FC, NAS, or iSCSI). 4) Compatibility with all OSs supported with VMware ESX.
380
Provides zero downtime and zero data loss for any VM against failures in physical servers.Creates a live shadow instance of the primary running on another physical server.Keeps two instances in virtual lockstep with each other.
VMware Fault Tolerance (FT)
381
True or False: VMware HA continuously and intelligently monitors capacity utilization and reserves spare capacity to be able to restart VMs.
TRUE
382
4 Key Features / Benefits of VMware HA
1) Minimizes downtime and IT service disruption while eliminating the need for dedicated stand-by hardware and installation of additional software. 2) Provides uniform HA across the entire virtualized IT environment without the need of failover solutions tied to either OS or specific applications. 3) Detects OS failures within VMs. If a failure is detected, the affected VM is automatically restarted on the server. 4) Ensures that capacity is always available in order to restart all VMs affected by server failure.
383
Automatically restarts VMs when servers or individual VMs unexpectedly fail (unplanned downtime)
VMware High Availability (HA)
384
Three key technical features offered by SRM in the context of DR in a VDC
1) Accelerated recovery by automating execution of failover. 2) Simplified creation and management of recovery plans. 3) Improved reliability of recovery plans by simplifying recovery and testing.
385
VMware workflow product that automates setup, failover, and testing of DR plans.
VMware vCenter Site Recovery Manager (SRM)
386
EMC Avamar VE and EMC DataDomain
Offer highly optimized backup software and storage solutions for VDC.
387
VMware vMotion and Storage vMotion
Enable migration of VMs
388
VMware HA and VMware FT
Offer high availability and fault tolerance features for VMs in a VMware-based virtualized environment.
389
VMware vCenter Site Recovery Manager
Automates and makes disaster recovery rapid, reliable, and manageable.
390
Products that facilitate business continuity in the VDC
1) VMware vCenter Site Recovery Manager 2) VMware HA and VMware FT 3) VMware vMotion and Storage vMotion4) EMC Avamar VE and EMC DataDomain
391
Failover challenges
Constraints on VM placement. For example, if selected VMs have to be placed on the same server / clustered servers.
392
In a service failover scenario, can the secondary site have different x86 hardware configuration than those at the primary site?
Yes
393
Two service failover steps
1) Replicated VMs are activated in the secondary (failover) site on the target servers. 2) The LUN at the primary site is made read-only and the LUN at the secondary site is made write-enabled.
394
Steps performed during an outage at the primary VDC site
Service Failover
395
True or False: By using array-to-array VM migration, VM migration can be performed across storage types such as Fibre Channel, iSCSI, and local SCSI.
TRUE
396
Potential application scenarios for array-to-array VM migration
1) Moving a VM off a storage device for maintenance or reconfiguration. 2) Redistributing VMs or virtual disks to different storage devices in order to balance storage capacity. 3) Decommissioning of physical storage to be retired.
397
Allows moving a live VM without ANY downtime.Independent of VM storage and type.
Array-to-Array VM Migration
398
Uses storage array based technology to move VMs or virtual disks across storage devices.
Array-to-Array VM Migration
399
When are Hot-On migrations useful?
Hot-On migration is useful in scenarios where a server or hypervisor is overloaded or requires maintenance and/or repair soon because it might be underperforming.
400
When are concurrent VM migrations useful?
Concurrent migrations are useful for continuously optimizing VM placement across the entire IT environment.
401
When is Hot-Suspended VM server-to-server migration useful?
Hot-Suspended Migration could be useful when a VM needs to be migrated from a failing server to another operational server.