Lesson 7: Summarizing Virtualization and Cloud Concepts Flashcards

1
Q

A cloud administrator configures a cloud instance to increase its resources during times of high utilization and decrease its resources when peak utilization times end. What cloud characteristic does this represent?

A. HA
B. Scalability
C. Metered utilization
D. Rapid elasticity

A

D. Rapid Elasticity

Rapid elasticity refers to the system’s ability to handle changes to demand in real time. A system with high elasticity will not experience loss of service or performance if demand suddenly increases.

Other options

A. High availability (HA) means that the service experiences very little downtime. Downtime can occur as a result of scheduled maintenance and unexpected outages.

B. Scalability means that the costs involved in supplying the service to more users are linear. Technicians can achieve scalability by adding nodes or by adding resources to each node.

C. The per-use billing for resources consumed by the cloud is metered utilization. The metering measurement is based on the type of resources such as storage, processing, bandwidth, or active users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A cloud service provider is taking advantage of software-defined networking (SDN) to allow customers to provision and deprovision cloud resources on-demand. Which layer of SDN does the SDN controller operate on?

A.API
B.Infrastructure
C.Application
D.Control

A

D. Control

In software defined networking, the SDN controller operates on the control layer between the application layer and the infrastructure layer.

Other options

A. Application programming interfaces (APIs) provide the interface between the control layer and application and infrastructure layers and scripts can automate calling functions in the layers.

B. The infrastructure layer is the bottom layer of SDN and it contains the devices (physical or virtual) that handle the actual forwarding (switching and routing) of traffic.

C. The application layer is the top layer of SDN and it makes decisions about how traffic is prioritized and secured and where it should be switched using business logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network technician installs virtual machines in hypervisor software that runs on a host operating system (OS). What kind of hypervisor setup is this? (Select all that apply.)

A.Type 1
B.Type 2
C.Guest OS
D.Bare metal

A

B. Type 2 and C. Guest OS

B. In Type 2 hypervisors, the hypervisor application installs onto a host OS, and the computer must have resources to run the host OS, the hypervisor, and the guest operating systems.

C. In a guest OS (or host-based) system, the hypervisor application is itself installed onto a host OS. The hypervisor software must support the host OS.

Other options

A. Type 1 hypervisor installs directly onto the computer and manages access to the host hardware without going through a host OS.

D. Bare metal virtual platform means that a Type 1 hypervisor installs directly onto the computer and manages access to the host hardware without going through a host OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network technician needs to create a sandbox that has an isolated environment to analyze viruses, worms, and Trojans. What is the most appropriate environment for the technician to do this in?

A. Client-side virtualization
B. Server-side virtualization
C. Application virtualization
D. Container virtualization

A

A. Client-Side Virtualization

Client-side virtualization is the most appropriate environment. As the guest OS will contain malware, it cannot infect the technician’s computer or network without misconfiguration of the host.

Other options

B. Server-side virtualization means deploying a server role as a virtual machine. For server computers and applications, the main use of virtualization is better hardware utilization through server consolidation.

C. Application virtualization means that the client either accesses an application hosted on a server or streams the application from the server ensuring that they are always using the latest version.

D. Container virtualization dispenses with the idea of a hypervisor and instead enforces resource separation at the OS level. The OS defines isolated containers for each user instance to run in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A developer wants to ensure that no matter what server an administrator deploys their application on, it has all the libraries and dependencies needed for the application to operate properly. How can the developer accomplish this?

A. Client-side virtualization
B. Server-side virtualization
C. Application virtualization
D. Container virtualization

A

D. Container Virtualization

Container virtualization enforces resource separation at the OS level and includes the variables and libraries required by the application process in the container.

Other options

A. Client-side virtualization refers to any solution designed to run on “ordinary” desktops or workstations. Each user will be interacting with the virtualization host directly.

B. Server-side virtualization means deploying a server role as a virtual machine. For server computers and applications, the main use of virtualization is better hardware utilization through server consolidation.

C. Application virtualization means that the client either accesses an application hosted on a server or streams the application from the server ensuring that they are always using the latest version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network technician gathers requirements to implement virtualization of multiple guest VMs that will need to communicate. Which of the following resource requirements will the technician need to employ? (Select all that apply.)

A. Virtualization support enabled on the CPU
B. Memory above what the OS requires
C. Low storage requirements
D. A virtual network environment

A

A. Virtualization Support Enabled on the CPU, B. Memory above what the OS requires and D. A Virtual Network Enviroment

A. Most virtualization software requires a central processing unit (CPU) with virtualization support enabled as the performance of the virtual machines will be impaired if hardware-assisted virtualization is not available.

B. Each guest OS requires sufficient system memory over and above what the host OS/hypervisor requires to support the VMs.

D. A hypervisor will be able to create a virtual network environment through which all the VMs can communicate, and a network shared by the host and by VMs on the same host and on other hosts.

Other options

C. Virtual machines will need mass storage as each guest OS takes up a substantial amount of disk space. The host stores each of the VM’s “hard disks” as an image file on the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A network technician configures a foundational cloud setup that will allow the developers to start all application development using a standardized server and database setup. What type of cloud service model is the technician configuring?

A.SaaS
B.IaaS
C.PaaS
D.DaaS

A

C. PaaS

Platform as a service (PaaS) would deploy servers and storage network infrastructure (as per IaaS) but also provide a multi-tier web application/database platform on top.

Other options

A. Software as a service (SaaS) provisions software licenses for a given number of seats so that a business would access software hosted on a supplier’s servers on a pay-as-you-go arrangement.

B. Infrastructure as a service (IaaS) is a means of provisioning IT resources, such as servers, load balancers, and storage area network (SAN) components, quickly.

D. Provisioning virtual desktop infrastructure (VDI) as a cloud service is known as desktop as a service (DaaS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For security reasons, an organization needs to ensure that its information is isolated and managed only by its employees. What cloud model should this organization adopt?

A. Public
B. Private
C. Community
D. Hybrid

A

B. Private

Private cloud infrastructure is completely private to and owned by the organization. This type of delivery method is more appropriate to organizations that require strict access control in their operations.

Other options

A. Public (or multitenant) is a service offered over the internet by cloud service providers (CSPs) who can offer subscriptions or pay-as-you-go financing or even provide lower-tier services free of charge.

C. Community is where several organizations share the costs of either a hosted private or fully private cloud.

D. Hybrid is a cloud computing solution that implements some sort of hybrid public/private/community. A hybrid deployment may provide some functions via a public cloud but keep sensitive data on-premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rather than purchasing a fixed number of software licenses, a business only wants to pay for the number of licenses they actually need at any given time. What kind of cloud service model is this business pursuing?

A.SaaS
B.IaaS
C.PaaS
D.DaaS

A

A. SaaS

Virtual infrastructure allows developers to provision on-demand applications much more quickly than previously. Software as a service (SaaS) grants access for software for a given number of seats so that a business would access software hosted on a supplier’s servers on a pay-as-you-go arrangement.

Other options

B. Infrastructure as a service (IaaS) is a means of provisioning IT resources, such as servers, load balancers, and storage area network (SAN) components, quickly.

C. Platform as a service (PaaS) would deploy servers and storage network infrastructure (as per IaaS) but also provide a multi-tier web application/database platform on top.

D. Provisioning virtual desktop infrastructure (VDI) as a cloud service is known as desktop as a service (DaaS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A developer wants to ensure that all the clients that use their application are always using the latest most updated version. How can the developer make sure of this?

A. Client-side virtualization
B. Server-side virtualization
C. Application virtualization
D. Container virtualization

A

C. Application Virtualization

Application virtualization means that the client either accesses an application hosted on a server or streams the application from the server ensuring that they are always using the latest version.

Other options

A. Client-side virtualization refers to any solution designed to run on “ordinary” desktops or workstations. Each user will be interacting with the virtualization host directly.

B. Server-side virtualization means deploying a server role as a virtual machine. For server computers and applications, the main use of virtualization is better hardware utilization through server consolidation.

D. Container virtualization dispenses with the idea of a hypervisor and instead enforces resource separation at the OS level. The OS defines isolated containers for each user instance to run in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Type 2 hypervisor?

A

Hypervisor software that must be installed as an application running on a host OS

A Type 1 (or bare metal) hypervisor is installed directly to the host hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You need to provision a virtualization workstation to run four guest OSs simultaneously. Each VM requires 2 GB system RAM. Is an 8 GB workstation sufficient to meet this requirement?

A

No

The host OS and/or hypervisor also requires system memory. If the host also a 2 GB requirement, you would only be able to launch three of the VMs simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main security requirement of a virtualization workstation configured to operate VMs within a sandbox?

A

A sandbox means that the VM environment should be isolated from the host and from other VM environments. A sandbox is often used to investigate malware. If the sandbox is secure, the malware can be executed and observed without the risk of it spreading to other systems (VM escaping).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A cloud service provides a billing dashboard that reports the uptime, disk usage, and network bandwidth consumption of a virtual machine. What type of cloud characteristic does this demonstrate?

A

Metered utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company has contracted the use of a remote datacenter to offer exclusive access to platform as a service resources to its internal business users. How would such a cloud solution be classed?

A

As a private deployment model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A technician provisions a network of virtual machines running web server, scripting environment, and database software for use by programmers working for the sales and marketing department. What type of cloud model has been deployed?

A

This is a platform as a service (PaaS) model.

Infrastructure as a service (IaaS) would only provision the VMs and network without the software.

It is not software as a service (SaaS) because the web server and database are unconfigured.

17
Q

When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. What type of infrastructure is being deployed?

A

Virtual desktop infrastructure (VDI)