Module 2 App Assessment & Migration Planning Flashcards

1
Q

First layer of the cloud stack

A

Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Drive the decisions made throughout the rest of the stack in the VDC

A

Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Has the most to gain from a well designed VDC

A

Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can application deployment and management be simplified?

A

By using techniques and technologies available in other layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How application uptime can be enhanced

A

By using features available in the hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

First step in application assessment

A

To understand the applications in the environment, their value to the organization, and their requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Examples of application requirements

A

Data security, accessibility, latency, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Four modern application delivery challenges

A
  1. Little attention to performance during development
  2. Security vulnerabilities
  3. Distributed employees
  4. Distributed applications & associated complexity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five new application delivery challenges

A
  1. Movement away from monolithic architectures
  2. Web 2.0 & rich content application requirements
  3. SLAs
  4. Legacy apps and application silos
  5. Consumerization of IT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Three virtualization technology opportunities

A
  1. Increase flexibility
  2. Reduce cost
  3. Tighten security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:
Generally, the role of application performance & robustness has been pushed down the stack to the compute, network, and storage layers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can employees be distributed?

A

Across organization facilities, small field offices, home offices, or at customer sites using mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can applications be distributed?

A

With multiple presentation layers, residing on separate machines and locations from the business logic layers and data access layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two examples of Web 2.0 systems

A

Facebook

LinkedIn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can IT eliminate traditional costs and become leaner?

A

Through consolidation and standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Makes a customer dependent on a vendor for hardware or software, creating a situation where they are unable to use another system without incurring substantial costs or data loss.

A

Vendor Lock-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Five items to evaluate to determine if vendor lock-in exists

A
  1. Proprietary hardware, software, APIs, file formats
  2. Software limited to certain hardware platforms or configurations
  3. Abandonware
  4. Availability of source code, documentation, skillsets
  5. Licensing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Three legal issues pertaining to vendor lock-in

A
  1. Government laws
  2. Commercial licenses
  3. Open Source licenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: Vendor lock-in is limited to large hardware / software / systems companies.

A

False.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Three vendor lock-in scenarios for software

A
  1. Where software only runs on specific hardware.
  2. Where software uses unpublished APIs.
  3. Where software uses undocumented file formats.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or False: Systems developed in-house can lead to vendor lock-in scenarios.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Category of software in which the product is not being maintained due to the vendor stopping work, going out of business, the in-house developer leaving the company, etc.

A

Abandonware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False:

Hardware can also fall into the category of abandonware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Makes it much easier and less costly to work with vendor lock-in situations

A

Availability of source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Contributing to the availability of software

A

Rise in popularity of the Open Source Software (OSS) movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Included in many Open Source Software licenses

A

Responsibility to submit any changes made in the code back to the OSS community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Three areas of savings

A
  1. Reduced power, cooling, data center space.
  2. Better management of licensing costs (be careful of VM sprawl).
  3. OPEX
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

VDC Migration Planning Process

A
  1. Survey the environment.
  2. Identify systems that can be combined, commoditized, replaced, or obsoleted.
  3. Plan goals, using a phased approach.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Question that must be asked when converting to a VDC

A

How much does it cost to save money?

In other words, what is the up-front CAPEX that will be required to eventually save money?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How should migrating to a VDC be done?

A

Perform the migration in phases, migrating a few applications and systems at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Five considerations in VDC migration planning

A
  1. Determine phases of migration.
  2. Migrate a few applications and systems at a time.
  3. Look for overlap and underutilization of resources.
  4. Ask if some systems might be combined or replaced.
  5. Identify servers to eliminate or reuse.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Technique that can take advantage of the dynamic nature of the VDC

A

Combine systems when demand is not high, then scale out as demand increases (since many IT purchases are done in order to handle maximum load).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Five migration plan goals

A
  1. Use a phased approach
  2. Free up hardware and repurpose systems
  3. Consolidate the network
  4. Reduce licensing and maintenance costs
  5. TIme migrations when capacity demand is low
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Tricky part of converting the data center into a private cloud

A

Migrating the legacy, business critical application(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Three details associated with Traditional Data Center to VDC phase

A

Identify applications.
Is decoupling possible?
Rewrite apps?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Detail needed for VDC phase

A

Application variability and latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Details associated with VDC to Cloud

A

Migrating applications to Cloud.
Multi-tenancy.
High availability and eventual consistency (elasticity).
Bursting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

True or False:

Many large data centers have the infrastructure to become a Cloud.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Becomes even more of a deterrent when an organization is looking to outsource their IT to the Cloud

A

Migrating the legacy, business critical applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Three options to consider for application migrations

A
  1. Does the cost and effort of application rework, testing and redeployment outweigh the cost of maintaining the legacy app in-house?
  2. Can the app run in the Cloud infrastructure?
  3. Once migrated to the Cloud, consider vendor lock-in in case the app needs to move from the Cloud.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Dependencies for successful deployment of Clouds within organizations

A
  1. Can the application be decoupled from the physical server (i.e., can the app be virtualized)?
  2. Can the physical resource meet the demands of the application.
  3. The application may be legacy and only operate on legacy hardware that is incompatible with the Cloud resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Most challenging element for moving the VDC to the Cloud

A

Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Advantage of moving toward the private Cloud

A

There may be little-to-no redesign efforts required for applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Six general application types

A
  1. Legacy
  2. Enterprise
  3. Big Data
  4. Web Scale and Horizontal
  5. Mobile
  6. Desktop Virtualization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Dated application that continues to serve a business need.

Typically resides on older, slower servers.

A

Legacy application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Application type that:

  • Solves and enterprise-wide problem.
  • Software typically used for: order processing, procurement, production scheduling, customer information management, and accounting.
A

Enterprise Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Application type that:

  • Processes large quantities of data.
  • Technologies include: Massively Parallel Processing (MPP) databases, data mining infrastructures (e.g., Apache Hadoop Framework), distributed file systems, distributed DBs, MapReduce algorithms, cloud computing platforms, Internet, & archival storage systems.
A

Big Data Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Application type that:

  • Software uses over a broad group of users.
  • Examples: word processing, bookkeeping software, social network
A

Web Scale and Horizontal Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Application type that:

  • Usually runs on alternative end points such as phones and tablets.
  • Uses web technologies: HTML, XML, etc.
A

Mobile Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Application type that:

  • Adds a virtualization layer between the server and the desktop.
  • Provides greater accessibility, tighter security, and ease of management.
A

Desktop Virtualization Application (VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Six classifications or categories of applications

A
Legacy apps
Enterprise apps
Big Data apps
Web Scale and Horizontal apps
Mobile apps
Desktop Virtualization apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Applications that typically do not adapt well to a VDC and can take significant work to migrate.

A

Legacy Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What can offset the cost of maintaining legacy apps?

A

Removing the legacy apps from obsolete hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Disadvantages of Integrating Legacy Apps in the VDC Plan

A
  • Hard to migrate & integrate into the VDC and Cloud.
  • Typically built on non-x86 platforms.
  • Tightly coupled w/ underlying platform & technologies.
  • Application re-work is manual and time intensive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Advantages of Integrating Legacy Apps in the VDC Plan

A
  • Remove silos of infrastructure dedicated to a single application.
  • Move to a modern platform - improve performance & longevity.
  • Reduce IT resources needed to manage and maintain legacy apps.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Integration of legacy apps in the VDC plan can be both…

A
  • a source of tremendous gains in a move to VDC.

- a source of great expense in the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Three Legacy Application Migration Challenges

A
  1. Incompatible dependencies
  2. Interaction among shared resources - unanticipated problems
  3. Cross-platform effort
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Examples of incompatible dependencies when migrating legacy applications

A

Libraries
Middleware
Kernel modules
Drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Two questions to consider concerning application migrations

A
  1. Does the cost & effort of application rework, testing, and redeployment outweigh the cost of maintaining the legacy app in-house?
  2. Can the application run in the VDC or Cloud infrastructure?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

True or False: Considering industry trends, data for legacy applications has little, if any, growth.

A

True.

Implication: It may not warrant the level of effort & cost a migration may impose.
2.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

5 Enterprise Application Business Characteristics

A
  1. Mission-critical (downtime measured in $)
  2. Typically enterprise wide (impacts all users)
  3. Dedicated resources to manage & maintain
  4. Distributed - may span VDCs
  5. Stringent SLAs & recovery objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

5 Enterprise Application Technical Characteristics

A
  1. Clustered
  2. Multi-processor
  3. High memory usage
  4. High bandwidth requirement
  5. Large storage footprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

True or False: Traditional horizontal applications, such as email, are increasingly considered mission critical among organizations.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

EAI

A

Enterprise Application Integration (EAI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Established the sharing of functionality and data between separate islands.

A

Enterprise Application Integration (EAI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

3 Approaches to EAI

A
  1. EAI Via Mesh
  2. Enterprise Service Bus (ESB)
  3. Service-Oriented Architecture (SOA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

SOA

A

Service-Oriented Architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

ESB

A

Enterprise Service Bus (ESB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Middleware layer that acts as an intermediary between separate systems

A

Enterprise Service Bus (ESB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Architecture where systems are designed as reusable modules that can be called when and where needed.

A

Service Oriented Architecture (SOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Links disparate apps within an org to simplify & automate business processes to the greatest extent possible, while at the same time avoiding the need to make changes to existing apps or data structures.

A

Enterprise Application Integration (EAI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Links disparate apps within an org to simplify & automate business processes to the greatest extent possible.

A

Enterprise Application Integration (EAI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Avoids the need to make changes to existing apps or data structures.

A

Enterprise Application Integration (EAI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Challenges to Accomplishing Enterprise Application Integration (EAI)

A
  1. Systems developed in different programming languages.
  2. Data may live in different database formats.
  3. Systems may run on different operating systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Can lead to a complex mesh of connections & interfaces as each system establishes communications with the others in the enterprise.

A

Enterprise Application Integration (EAI) via Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Framework (or software architecture) that forms a middleware layer, enabling integration of systems and applications across the enterprise.

A

Enterprise Service Bus (ESB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Addresses the problem of inter-systems communication & allows sharing of data & business processes across connected apps or data sources.

A

Enterprise Application Integration (EAI) via Enterprise Service Bus (ESB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Method used for implementing EAI

A

Enterprise Service Bus (ESB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Acts as the mediator for the interaction and communication between software applications.

A

An Enterprise Service Bus (ESB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Set of software development principles for designing and developing software as services.

A

Service-Oriented Architecture (SOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Well-defined business functions that are built as individual pieces of code with interface “hooks” or APIs.

A

Services within a Service-Oriented Architecture (SOA) environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

4 “V”s of Big Data

A
  1. Variety
  2. Velocity
  3. Volume
  4. Value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

3 Characteristics of Big Data

A
  1. Data volume
  2. Processing complexity
  3. Multiple combinations of structured & unstructured sources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Meaning of ‘Variety’ in a Big Data context

A

Data is not in a single format; email, tweets, images, standard relational DBs, text files, audio/video files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Meaning of ‘Velocity’ in a Big Data context

A

Data is generated or changed very quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Meaning of ‘Volume’ in a Big Data context

A

Huge quantities of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Meaning of ‘Value’ in a Big Data context

A

Big Data is used to solve specific problems or to answer a specific question

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

True or False: Big Data is solely characterized by large data sets / sizes.

A

False

Big Data also focuses on processing complexity as well as combinations of structured & unstructured data sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Four challenges of Big Data applications

A
  1. Can lead to app sprawl or VM density issues that can bottleneck VDC compute resources.
  2. BC/DR, retention, & security become unmanageable.
  3. Increased data load rates can bottleneck the VDCs network.
  4. Typically computing that requires high-speed networks - 10GbE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Components for Handling Big Data

A
  1. Inexpensive, reliable storage.
  2. Analysis tools for unstructured & structured data.
  3. Hadoop and MapReduce suited to support distributed computing on large data sets.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Typical percentage of historical data in most production systems

A

60%

some organizations see upwards of 95%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

True or False: Applications that load large data sets and run analytics typically require 10Gig Ethernet.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Why can using business intelligence applications on VMs be attractive?

A

Allows for greater utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Typical example of how business intelligence applications are run in a virtual environment.

A
  1. Business intelligence app run analytics periodically (e.g., to generate a monthly report).
  2. VMs can be started, the data analyzed, and a report generated.
  3. Then the VMs can be shutdown and the resources released.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

True or False: What constitutes a “large” data set is relative and can vary from one organization to another.

A

True

A large data set for one org may be 100s of gigabytes.

For another org, it may be hundreds of terabytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Definition of a “large” data set

A

A large data set can be defined as the point at which the organization has difficulty managing the data set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Applications that:

  • scale at an exponential rate;
  • example: social networks;
  • can handle rapid growth without bottlenecks;
  • commonly NoSQL databases
A

Web Scale Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Type of application that is deployed and managed across a large user base

A

Horizontal Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Examples of horizontal applications

A

Desktop applications

Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Applications that will impact many users simultaneously

A

Horizontal applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Example of a horizontal application impacting many users simultaneously

A

An anti-virus update being pushed to all user desktops and images within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Enable BYOD and, to some extent, desktop virtualization

A

Mobile apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Application type that performs a specific task

A

Mobile Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Two basic types of mobile apps

A
  1. Native apps installed on the end point.

2. Web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

In a Mobile application context, web apps are sometimes disguised as what?

A

Native apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Applications often architected as traditional 3-tier applications

A

Mobile Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Generally written for a specific device or a target end point operating system

A

Native applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Reside on a server and are accessed via the Internet or cell phone network

A

Web apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Characteristics of web app software

A
  1. Written using HTML and supporting technologies (e.g., XML & CSS).
  2. Interactive parts are written in Java, Objective-C, or other language as the end point platform dictates.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Traditional 3-tier application architecture

A
  1. Presentation layer (the end point)
  2. Business logic layer (middleware)
  3. Data access layer (data store or DB of some kind)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

6 Benefits of Desktop Virtualization

A
  1. Ease of management & security
  2. VDI image library
  3. Heterogeneous OSs
  4. Snapshots
  5. Green
  6. Persistent and non-persistent desktops
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Two types of virtual desktop solutions

A
  1. Server Hosted

2. Client Hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Examples of Server Hosted virtual desktop solutions

A
  1. VDI - stateful and stateless desktops

2. Remote Desktop Services (RDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Example of Client Hosted virtual desktop solution

A

Desktop running as a VM on client system: full virtualization and paravirtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Not the typical VDC deployment

A

Client Hosted Desktop Virtualization Solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Abstracts the OS, applications, and associated data from the PC.

A

Desktop virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Most common desktop virtualization solution

A

Server hosted implementations (particularly VDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Desktop virtualization solution where the end users instantiate a session on a remote host machine

A

Server hosted implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Require a virtualization platform be installed on the local system.

A

Client hosted virtual desktops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Offers the ability to switch between several desktops - such as between a Linux environment, a Windows XP corporate environment, and a Windows 7 environment.

A

Client hosted virtual desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

True or False: Both server hosted and client hosted desktop virtualization solutions require software installed on the client.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

True or False: Remote and client virtualization software is available for Windows, Mac, and Linux

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Benefit of Snapshots in a desktop virtualization solution

A

Ability to recover or rollback a user’s desktop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

How do desktop virtualization solutions contribute to a greener IT environment?

A

Thin clients have reduced power needs.

Consolidated computing in data centers can use power more efficiently.

Reusing older end points reduces technology discarded in landfills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Allows flexibility for stateless images to be used temporarily

A

Desktop state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Two examples of how desktop state can be used

A
  1. A client for visitors that can be rolled back each day.

2. A stateful image where employee changes to their desktop image is preserved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

5 Key Considerations for Application Migration to VDC

A
  1. Flexibility
  2. Elasticity
  3. Efficiency
  4. Multi-tenancy
  5. Costs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Three things that enable flexibility in application migration to VDC

A
  1. Templates
  2. Cloning
  3. Snapshots
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Enables quick scale out of application clusters to address burst and growth

A

Cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Reduces implementation and configuration times

A

Templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Four ffficiency benefits for application migration to VDC

A
  1. Better utilization of CPU, memory & bandwidth
  2. VDI
  3. Lower upgrade risks - snapshot rollbacks
  4. Lower application testing time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Two benefits of Multi-Tenancy

A
  1. Failure isolation

2. Improved resource utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Applications which cannot be migrated to VDC

A
  1. Appliance-based applications
  2. Applications with specific hardware requirements
  3. Application that are not supported by the vendor when running in a virtual environment
  4. Applications with data requiring isolation
134
Q

Three examples of appliance applications

A
  1. Storage controllers
  2. Network devices
  3. Highly specialized software that requires a vendor-supplied hardware platform
135
Q

Examples of application hardware dependencies

A

CPU architecture

BIOS

Peripherals and drivers

136
Q

Three drivers of data / application isolation

A
  1. Legal or regulatory requirements
  2. Political
  3. Test / dev / production
137
Q

Why multiple applications’ data requirements should be distilled into a few categories or ranges

A

So standard data pools can be created

138
Q

Goal when virtualizing the data center

A

Reduce (to zero if possible) the number of “special” cases.

139
Q

Benefit of minimizing the number data classifications

A

Simplifies management and planning - enabling the benefits of standardization to be realized.

140
Q

5 data classification dimensions

A
  1. Size
  2. Response time
  3. Availability
  4. RTO
  5. RPO
141
Q

Examples of RPOs

A

Zero data loss

< 4 hours loss

< 24 hours loss

142
Q

Examples of RTOs

A

Immediate

< 4 hours

< 24 hours

143
Q

Example availability requirement for email

A

99.999%

144
Q

Example availability requirement for Accounts Payable / Accounts Receivable

A

99.9%

145
Q

Example availability requirement for Expense Management

A

95%

146
Q

Example compute requirement for email

A

Multiple 4 x 3 MHz

147
Q

Example compute requirement for Accounts Payable / Accounts Receivable

A

2 x 3 MHz

148
Q

Example compute requirement for Expense Management

A

1 x 2 MHz

149
Q

Example storage requirement for Email

A

> 10 TB

150
Q

Example storage requirement for Account Payable / Accounts Receivable

A

1GB to 1TB

151
Q

Example storage requirement for Expense Management

A

< 1 TB

152
Q

Example storage response time requirement for Email

A

< 1 ms

153
Q

Example storage response time requirement for Accounts Payable / Accounts Receivable

A

< 10 ms

154
Q

Example storage response time requirement for Expense Management

A

< 100 ms

155
Q

Example network requirement for Email

A

Global

156
Q

Example network requirement for Accounts Payable / Accounts Receivable

A

Intranet

157
Q

Example network requirement for Expense Management

A

Local

158
Q

Example access requirement for Email

A

Internal and External

159
Q

Example access requirement for Accounts Payable / Accounts Receivable

A

Internal

160
Q

Example access requirement for Expense Management

A

Limited internal

161
Q

Example management requirement for Email

A

Fully automated

162
Q

Example management requirement for Accounts Payable / Accounts Receivable

A

Semi-automated

163
Q

Example management requirement for Expense Management

A

Manual

164
Q

Example RTO/RPO requirements for Email

A

RTO: Immediate

RPO: Zero

165
Q

Example RTO/RPO requirements for Accounts Payable / Accounts Receivable

A

RTO: < 4 hours

RPO: 4 hours

166
Q

Example RTO/RPO requirements for Expense Management

A

RTO: < 24 hours

RPO: 24 hours

167
Q

Example Regulatory / Compliance requirements for Email

A

High

168
Q

Example Regulatory / Compliance requirements for Accounts Payable / Accounts Receivable

A

Medium

169
Q

Example Regulatory / Compliance requirements for Expense Management

A

Low

170
Q

Cost if Lost / Exposed for Email

A

Very high

171
Q

Cost if Lost / Exposed for Accounts Payable / Accounts Receivable

A

High

172
Q

Cost if Lost / Exposed for Expense Management

A

Medium

173
Q

An email application can be compared very closely with what?

A

A utility.

When email fails, business can be stopped.

174
Q

Six benefits of virtualizing applications

A
  1. Multiple OSs can run on a single server
  2. Reduced CAPEX
  3. High Availability
  4. Enhanced Business Continuity (BC)
  5. Improved Disaster Recovery (DR)
  6. Centralized Management
175
Q

Two things that allow applications to be moved from one hypervisor server to another as needed to balance load and adjust for changes (failures) in the underlying server hardware or faults in the application servers themselves.

A

Hypervisor clustering

Application fault tolerance

176
Q

How CAPEX is reduced when applications are virtualized

A

Increased energy efficiency

Less compute

Less network infrastructure

177
Q

Three things determined by application SLAs

A
  1. Amount of processing & memory needed in the compute space to meet the SLA
  2. How much bandwidth is required
  3. How much capacity is needed and how the life-cycle of the data is handled.
178
Q

Network resources needed to support SLA

A

Bandwidth

179
Q

Storage resources and technologies needed to support SLA

A

Tiering

180
Q

Compute resources needed to support SLA

A

CPU

Memory

Connectivity

181
Q

What dictates the technologies employed within the VDC infrastructure?

A

The applications that will use the resources

182
Q

5 Challenges with Virtualized Applications

A
Resource allocation
Application visibility
Storage management
Management complexity
VM sprawl and abandoned machines
183
Q

Resource allocation issue with virtualized applications

A

Shared environments can starve some applications

184
Q

Application visibility issue with virtualized applications

A

Hypervisors monitor VMs, not the applications running on the VMs.

185
Q

Storage management issue with virtualized applications

A

Moving from DAS to SAN / NAS

186
Q

Management complexity issue with virtualized applications

A

Not only manage the application, but the VM and hypervisor as well

187
Q

VM sprawl and abandoned machine issue with virtualized applications

A

Creating new machines becomes too easy

188
Q

Usual source of first alert of poor application performance

A

End user

189
Q

True or False: Most hypervisors have some concept of resource pooling that can detect, alert, cap, or proactively move applications that demand excessive resources to avoid starving other tenants.

A

True

190
Q

Much of the mobility functionality of modern hypervisors (i.e., the ability to move a VM and its applications among multiple hypervisor hosts) is dependent on what.

A

Shared storage resources

191
Q

Increasing node specifications is an example of what kind of scaling?

A

Vertical Scaling

192
Q

Increasing node count is an example of what kind of scaling?

A

Horizontal Scaling

193
Q

Increasing an application’s capability to handle more data, more clients, or a broader geographic region

A

Scaling an application

194
Q

True or False: Another way of upsizing an application is to decrease the application’s response time.

A

True

195
Q

Three ways to improve the architecture

A
  1. Faster networks
  2. Appropriate storage protocol
  3. Faster physical disks
196
Q

Migrating an applications hosted on a NL SAS-based LUN to an SSD-based LUN should provide a major increase in performance.

A

True

197
Q

Provides a major opportunity to improve response time

A

Hard disk architecture

198
Q

Used to solve a specific application problem, or in conjunction with virtual networks, or to address a scaling problem

A

Virtual Appliances

199
Q

Encapsulates all application attributes inside a VM

A

Virtual appliance

200
Q

Can be developed in-house, obtained via vendor, or community sites.

A

Virtual appliances

201
Q

6 Examples of Virtual Appliances

A
  1. Load balancers
  2. Routers / firewalls
  3. Databases
  4. Web servers
  5. Platform stacks
  6. Desktops
202
Q

A pre-build VM image

A

A virtual appliance

203
Q

True or False: A virtual appliance is a pre-built VM image.

A

True

204
Q

Used to quickly deploy standardized applications to solve a particular need.

A

Virtual appliance

205
Q

Can be used to quickly and easily deploy specific applications encapsulated in their own self-contained Virtual Machine wrapper.

A

Virtual Appliances

206
Q

Benefit of replacing application server clustering with a hypervisor fault tolerance feature.

A

Standardization

207
Q

Hypervisor features that can be leveraged to replace application functionality

A

Fault tolerance and high availability

Snapshot backups

Clone VMs

208
Q

True or False: There are many features available via hypervisors to support fault tolerance, high availability, disaster recovery, VM deployment, etc.

A

True

209
Q

VDI

A

Virtual Desktop Infrastructure

210
Q

A set of techniques and technologies that allows remote access to a desktop environment, usually residing in a data center.

A

Virtualized Desktop Infrastructure (VDI)

211
Q

Benefits of VDI

A

Anywhere, anytime, multiple device access.
Standardized desktop.
Ease of managing multiple desktops.
Compliance.
Ease of support.
Centralized BC/DR and backup.
Reduced exposure to environmental hazards and theft.

212
Q

Promises flexible access from any device capable of running the client-side software needed to connect to the virtual desktop.

A

VDI

213
Q

Allows a desktop to reside in the data center and is under IT’s control.

A

VDI

214
Q

Cost savings of VDI

A

Offers relatively long-term cost savings.

Do not expect immediate cost savings.

215
Q

Important in a VDI design

A

High Availability

216
Q

Why VDI outages are serious

A

In VDI, user desktops become a data center application.

An outage can impact many end users.

217
Q

What can cause huge I/O loads in VDI deployments?

A

Normal or trivial tasks, such as:

  • Boot storms
  • Virus scans
  • Indexing

These and other rather mundane items take on a different personality when running across hundreds or thousands of user desktops at the same time.

218
Q

Occurs when a VDC environment must start up hundreds or thousands of virtual desktop environments at the same time.

A

Boot Storm

219
Q

Ways to minimize the effect of boot storms

A

Proper use of storage tiering, broad network access, sufficient compute resources, & hypervisor/VDI features.

220
Q

Benefits of Desktop Virtualization

A
  • Ease of large scale management
  • Enables BYOD
  • Data protection
  • Reduce / eliminate environmental factors
  • Standardize platform(s)
  • Work anywhere
221
Q

Impacting and transforming organizations’ businesses

A

Consumer-class technologies & services such as mobile applications, Web 2.0 social networks, multimedia, and mobile devices.

222
Q

Create challenges for IT departments and blur the boundaries between business and personal use.

A

Consumer-class technologies & services such as mobile applications, Web 2.0 social networks, multimedia, and mobile devices

223
Q

Adoption of consumer-grade end user devices, supporting technologies, and the empowerment of choice given to the end user

A

Consumerization of IT

224
Q

Traditionally known as Terminal Services

A

Remote Desktop Services (RDS)

225
Q

The traditional Server Based Computing (SBC) technology

A

Remote Desktop Services (RDS), a.k.a., Terminal Services

226
Q

VDI Benefits

A
  • Recent technology
  • Better fault tolerance
  • Can deploy thin density
  • True user segmentation
227
Q

Primary benefit of RDS

A

User density - the ability to serve more user desktops per host CPU core

228
Q

Drawback of RDS

A

Sessions are more dependent upon the stability of the underlying OS, resulting in a potential decrease in stability of the end user platforms.

229
Q

How does VDI result in better fault tolerance?

A

VDI uses fully segregated VMs which offers additional fault tolerance, such as VM failover and redundancy.

230
Q

Why is software compatibility with VDI generally greater than RDS?

A

RDS can have issues due to the single OS running underneath the sessions.

231
Q

General comparison of RDS and VDI technologies

A

While RDS is by far the most mature technology, the decrease in storage and CPU costs is helping to mitigate the costs of VDI, leading to a huge growth in that area.

232
Q

Outpacing the use of PCs

A

Use of thin clients

233
Q

True or False: Many thin clients are being designed for VDI.

A

True

234
Q

Manages server-hosted remote desktop to clients

A

VDI Connection Broker

235
Q

Works in conjunction with authentication / authorization and hypervisor

A

VDI Connection Broker

236
Q

True or False: a VDI implementation can consist of virtual desktops that clients can access with end-user credentials.

A

True

237
Q

Preferred VDI implementation

A

Uses a connection broker to handle assignments of virtual desktops to clients

238
Q

VDI Connection Broker Functions

A
  • Assignment of a desktop from a pool or a dedicated virtual desktop.
  • Web interface that can create secure SSL connections to remote desktops.
  • Directory Services integration
  • Full USB support
  • Support for various display protocols
  • Integration with Remote Desktop Services (former Terminal Services)
239
Q

Techniques for separation of different types of data

A
  • Home directories and group policies
  • Roaming profiles and folder redirection
  • VMware user data disks
  • AppSense Environment Manager - Profile Management
  • RTO TScale - Application Load Management
240
Q

Optional, but reduces storage consumption

A

Data separation

241
Q

Benefits of data separation

A

Separating user data reduces storage consumption.

Separating different types of data allows for proper storage policies to be set.

242
Q

Prime reason for converting to VDI

A

Increased data security

243
Q

In VDI, the only connection from outside the network

A

From the end users remotely controlling their desktop systems.

244
Q

In VDI, where additional security and authentication is configured

A

Via the connection broker

245
Q

Require just as much hardening as physical systems

A

The virtual desktops themselves

246
Q

Does not negate the need for true security software to be installed

A

The temptation to use VM snapshot reversion to solve all virus and corruption issues

247
Q

Should be part of a segmented end-user network, even though they may be physically hosted in the same rack as production servers, or perhaps on the same hypervisor itself

A

the VMs hosting the virtual desktops

248
Q

Keeps data and application traffic on the secure corporate network

A

VDI

249
Q

VDI Security on the Physical Client

A

Use secure protocols to access virtual desktops

250
Q

VDI Security on the Virtual Desktop

A

Do not rely on “reversion” for security.

Have same anti-virus, restrictions as physical desktops.

251
Q

VDI Security - Segmentation

A

Place user desktops in the same domain as physical desktops.

Segment from protected servers.

252
Q

VDI Security - Physical Infrastructure

A

Standard security considerations

253
Q

VDI is NOT recommended if the organization…

A

Is averse to complexity.

Does not have a solid infrastructure.

Does not have a budget for it.

254
Q

Consider VDI if the organization…

A
Wants to reuse legacy desktops.
Supports a distributed workforce.
Wants to contain intellectual property.
Wants to standardize.
Has compliance issues.
Has a BYOD environment.
Is willing to relearn desktop management.
255
Q

Can be used with or without VDI

A

Client-Side Application Virtualization

256
Q

Access applications when / where / if needed

A

Client-Side Application Virtualization

257
Q

Applications are streamed, thinly installed, or presented on the end point machine

A

Client-Side Application Virtualization

258
Q

Users can access the latest version of the application without installing the entire application on their machine.

A

Client-Side Application Virtualization

259
Q

Administrators have a single maintenance point.

A

Client-Side Application Virtualization

260
Q

Applications with different or conflicting requirements can run on one device.

A

Client-Side Application Virtualization

261
Q

Various products allow a level of deterministic behavior based on the location of the end point, such as inside the organizational network or a trusted remote location.

A

Client-Side Application Virtualization

262
Q

Apps loaded on the end point as they are used

A

Application Streaming

263
Q

Ways that applications can be handled in a Client-Side Application Virtualization environment

A
  1. Streamed (loaded on end point as they are used).
  2. Installed onto a lightweight VM on the end point.
  3. Run remotely accepting keyboard & pointer input while returning video and optional sound.
264
Q

One of the main benefits of application virtualization

A

Providing a central distribution point

265
Q

Advantages of a central distribution point for applications that are virtualized

A
  1. Users always have access to the latest version.

2. Provides administrators a single location to apply patches & monitor usage.

266
Q

True or False: Application virtualization allows different versions of the same application.

A

True

267
Q

True or False: Application virtualization allows applications that do not directly support the end point to be run either virtually, or via presentation to the end point.

A

True

268
Q

Has tremendous implications to BYOD environments, or environments that wish to prolong the life of otherwise legacy hardware and software.

A

Application virtualization allowing applications that do not directly support the end point to be run either virtually, or via presentation to the end point.

269
Q

True or False: Application Virtualization is separate from, and not dependent on, Desktop Virtualization

A

True

270
Q

True or False: Application Virtualization and Desktop Virtualization complement each other nicely.

A

True

271
Q

Two Basic Application Virtualization Architectures

A
  1. Presentation Mode

2. Thin Install

272
Q

Application Virtualization Architecture where:

  1. Application runs on a remote machine.
  2. Keystrokes & pointer sent.
  3. Video, audio sent back.
A

Presentation Mode

273
Q

Application Virtualization Architecture where the compute resources runs on a system that is remote from the end user, like in the data center.

A

Presentation mode

274
Q

Application Virtualization Architecture where:

  1. Application runs on the end point.
  2. Application packaged to run inside a minimal VM wrapper.
  3. Application might be streamed.
A

Thin Install

275
Q

Application Virtualization Architecture where the software and needed support / config info is downloaded to the end point and executed in a virtual “bubble”.

A

Thin Install

276
Q

Isolates the program and the configuration information from the host OS

A

Virtual “bubble”

277
Q

In this application virtualization architecture, the end point need only be compatible with the wrapper program that contains the virtual bubble.

A

Thin Install

278
Q

True or False: In a Thin Install application virtualization architecture, different versions of the same program that are incompatible with each other could potentially run on the same machine at the same time.

A

True

279
Q

True or False: In a Thin Install application virtualization architecture, software that does not support the end point architecture may be able to run on the end point in the virtual bubble.

A

True

280
Q

Application and wrapper components are downloaded as needed.

A

Streaming

281
Q

Only enough of the program needed to run is downloaded to the end point.

A

Streaming

282
Q

Provides an opportunity to employ storage tiering to place this type of data in a pool that had different characteristics than, say, the storage holding the VDI image itself.

A

Storage of user and data

283
Q

Requires the use of some kind of software tool that understands the requirements of the virtualized software and can package it for use in the environment.

A

Thin Install

284
Q

Terms used to refer to the use of some kind of software tool that understands the requirements of the virtualized software and can package it for use in the environment.

A

Packaging or Sequencing

285
Q

True or False: Thin install and streaming applications require a packager.

A

True

286
Q

Ideal for horizontal applications

Greater efficiency of resources

Use with/without VDI

A

Deploying Application Virtualization with VDI

287
Q

True or False: Application Virtualization is an emerging technology, which can be deployed even without VDI.

A

True

288
Q

A natural enhancement to a VDI environment, because it allows more users to connect to simplified and pooled virtual desktops.

A

Application Virtualization

289
Q

a standard corporate Windows 7 desktop with only the barest applications required

A

typical virtual desktop

290
Q

Location of users roaming profile

A

NAS

291
Q

Default documents and desktop storage for the user

A

Users Roaming Profile

292
Q

True or False: In an application virtualization environment, since the NAS solution is also in the data center along with the virtual desktop, working with documents is provided at-near or at-local disk speeds.

A

True

293
Q

May provide the greatest benefit in terms of managing user images and resiliency against hypervisor failure.

A

Application Virtualization Environments

294
Q

True or False: The connection broker works from a pool of desktops, and is not tied to a specific desktop hosted on a single hypervisor.

A

True

295
Q

Benefits of Client-Side Application Virtualization

A
  1. Cross-platform execution
  2. OS isolation
  3. Deployment flexibility
  4. Ease of license tracking
  5. Ease of patch deployment
296
Q

Drawbacks of Client-Side Application Virtualization

A
  1. Some applications cannot be virtualized.
  2. Different and additional management tools.
  3. Complexity
297
Q

Application Consideration Checklist Questions 1 - 4

A
  1. If this is a legacy app, can app convert from physical to virtual (P2V).
  2. What is the VDC users tolerance to latency?
  3. How critical is this application to the business?
  4. How many users use this application?
298
Q

Application Consideration Checklist Questions 5 - 8

A
  1. How sensitive is the data used by the application?
  2. Are there regulatory concerns with the data?
  3. Is the application slated to be decommissioned?
  4. Is the source code available?
299
Q

Application Consideration Checklist Questions 9 - 12

A
  1. What is the application’s stack? (OS/DB, n-tier, etc.)
  2. What are the application’s integration points with other apps?
  3. Estimated storage space need?
  4. Estimated storage latency requirement?
300
Q

Application Consideration Checklist Questions 13 - 16

A
  1. Is the application usage pattern predictable?
  2. What are the monitoring needs of the application?
  3. Have transient applications workloads been taken into consideration (test/dev, migrations, conversions)?
  4. Can the app be simplified by breaking it into pieces or purchasing COTS or use SaaS to replace homegrown elements?
301
Q

Application Consideration Checklist Questions 17 - 20

A
  1. Can interprocess communications be replaced with more network centric technologies?
  2. Are apps designed to dynamically scale across all components?
  3. Are load balancers designed in the solution?
  4. Can the application interface handle new data stream inputs?
302
Q

Application Consideration Checklist Questions 21 - 22

A
  1. What is the acceptable application response time?

22. What is the cloud tenant / VDC users tolerance to latency?

303
Q

Applications should be built for what two attributes?

A

Resiliency

Fault Tolerance

304
Q

How are resiliency and fault tolerance applied to a distributed application?

A

Any failed shard or cluster should not halt or bring down the entire application.

305
Q

Design applications based on what assumption?

A

The assumption that applications will fail.

306
Q

High Availability Considerations 1 - 4

A
  1. Does the application require High Availability (HA)?
  2. Is the application designed for HA?
  3. Is the launching of an application cluster automated?
  4. Is the application data persistent?
307
Q

High Availability Considerations 5 - 8

A
  1. How are backups managed?
  2. What are the redundancy options in the event of a hardware failure?
  3. What are the disaster recovery options?
  4. What concurrency model is in place for multi-user edits (pessimistic, optimistic, or none)?
308
Q

High Availability Considerations 9 - 10

A
  1. Is the application designed with network-based interfaces?
  2. Is the application in a shared cluster, shared instance, or dedicated cluster?
309
Q

Brownfield

A

Existing systems in place

310
Q

Greenfield

A

New installations

311
Q

Insert or replace into existing environment

A

Phased installations

312
Q

Complete replacement of systems

A

Forklift upgrades

313
Q
  1. Maintains parallel systems
  2. Can be more expensive due to duplicate systems
  3. Requires some planning
  4. Whole sections of the environment are replaced at a time
A

Forklift Upgrade

314
Q
  1. May not have parallel systems.
  2. Can be less expensive, repurpose systems.
  3. Requires extensive planning.
  4. Small sections of the environment are replaced at a time.
A

Phased Upgrade

315
Q

If the goal of a project is to migrate from a legacy architecture to a VDC, how might a phased plan be broken up?

A

A phased plan might be broken up across layers - storage, network, compute, and application.

316
Q

Citrix ICA Client

A
  1. Create a VDI infrastructure with app virtualization using XenDesktop and Xen App.
  2. Infrastructure / App servers & desktops run on separate clusters w/ EMC VNX providing storage for both.
  3. Cisco UCS used for desktop images
  4. Cisco Nexus switches for connectivity.
317
Q

Example of virtual desktop client software

A

Citrix ICA Client

318
Q

How can different desktop configurations be deployed for different users based on their role in the organization?

A

Through integration with Active Directory Services

319
Q

Provides authentication and authorization, as well as Group Policies for managing the redirection of user data folders and user state persistence between sessions.

A

Active Directory Services

320
Q

Function of XenApp 6.5 servers

A

Streaming of virtualized applications

321
Q

Function of XenDesktop 5.5 controllers

A

Control of the desktops

322
Q

Function of XenServer 6

A

Hypervisor platform for the VDI environment

323
Q

True or False: All of the infrastructure components that make up the VDI environment are running as VMs.

A

True

324
Q

How many virtualized Windows 7 desktops (approx) can 20 Ciscu UCS B-Series blade servers handle?

A

~1,000 Windows 7 Virtualized Desktops

325
Q

Function of Cisco UCS B-Series blade servers

A

Used to run the actual desktop instances (compute and network)

326
Q

Function of EMC VNX5300

A

Stores the VM images for the infrastructure and desktop images, as well as serves CIFS shares for the redirected user profiles and home directories.

327
Q

Benefits of a VDI infrastructure using EMC VNX, XenDesktop, XenApp, XenServer, & Cisco UCS

A
  1. Increased security by centralizing business-critical information.
  2. Increased compliance, & ability to prove compliance as data is not stored on the end points.
  3. Ease of managing desktops through standardization & centralization.
  4. Empowerment of users to work from any location.
  5. Embraces the consumerization of IT through multiple end point support.
  6. Increased business agility & adaptability by allowing rapid, flexible desktops to support changes in the business landscape.
328
Q

Function of EMC Fast VP Tiered Storage

A

Move active data sources to Enterprise Flash Drives (EFDs) while less active data is moved to a tier more suited to lower performance requirements.

329
Q

Benefit of tiered storage pools

A

Allow workload granularity that does not require the DBA to tune the database to meet SLA requirements.

330
Q

What drives the architecture?

A

Application Requirements

331
Q

What needs to be inventoried?

A

Applications, data, and security requirements.