Module 3 Flashcards
How many archive log files can be maintained at one time
six
A virtual machine consists of the following files:
- A configuration file (.vmx).
- One or more virtual disk files. The first virtual disk has files VM_name.vmdk and VM_name-flat.vmdk.
- A file containing the virtual machine’s BIOS settings (.nvram).
- A virtual machine’s current log file (.log) and a set of files used to archive old log entries (-#.log).
- Swap files (.vswp) used to reclaim memory during periods of contention.
- A snapshot description file (.vmsd). This file is empty if the virtual machine has no snapshots.
Virtual Machine Communication Interface (VMCI) provides a high-speed communication channel
between a ______ __________ and the__________ . You cannot add or remove VMCI devices.
virtual machine,hypervisor
The following 2 types of communication exist with Virtual Machine Communication Interface (VMCI) :
- Datagrams: Connectionless and similar to UDP queue pairs
* Connection oriented: Similar to TCP
The maximum number of vCPUs that you can assign to a virtual machine depends on?
The number of logical CPUs on the host
The type of installed guest operating system
A virtual machine running on an ESXi 6 host can have up to ____ vCPUs.
128
You size the virtual machine’s CPU and memory according to the __________ and the guest
operating system.
applications
When you configure networking for a virtual machine, you select or change the following items:
The network adapter type
• The network connection
• Whether to connect to the network when the virtual
machine powers on
The following features are unavailable for virtual machines configured with vSphere DirectPath I/O:
- Hot adding and removing of virtual devices
- Suspend and resume and replay
- Fault tolerance
- High availability
- vSphere DRS: Limited availability. The virtual machine can be part of a cluster, but cannot migrate across hosts.
vRDMA supports RDMA, providing the following 4 functions?
- OS bypass
- Zero-copy
- Low latency and high bandwidth
- Less power usage and faster data access
The virtual machine console is used for tasks such as
power cycling, configuring hardware, and troubleshooting network issues.
not for daily tasks
You can create virtual machines in several ways:
Use the New Virtual Machine wizard to create virtual machines.
• Deploy virtual machines, virtual appliances, and vApps stored in OVF.
• Use a CentOS, Linux, or Windows template in a VMware vCloud® Air™ catalog to create virtual machines.
Regardless of where it is run, the New Virtual Machine wizard prompts you for standard information:
- The virtual machine name and folder.The resource on which the virtual machine will run: a host, a cluster, a vApp, or a resource pool. The virtual machine will have access to the resources of the selected object.
- The datastore on which to store the virtual machine’s files. Each datastore might have a different size, speed, availability, and other properties. The available datastores are accessible from the destination resource that you selected.
- The guest operating system to be installed into the virtual machine.
- The number of NICs, the network to connect to, and the network adapter type.
- Virtual disk provisioning choice.
VMware Tools enhances the performance of a virtual machine and makes possible many of the ease-
of-use features in VMware products:
• Significantly faster graphics performance and Windows Aero on operating systems that support
Aero.
• The Unity feature, which enables an application in a virtual machine to appear on the host desktop like any other application window.
• Shared folders between host and guest file systems.
• Copying and pasting text, graphics, and files between the virtual machine and the host or client desktop.
• Improved mouse performance. •
• Synchronization of the clock in the virtual machine with the clock on the host or client desktop.
• Scripting that helps automate guest operating system operations.
• The ability to shut down the virtual machine.
VMware Tools can contain a ______ _____ signature. The VMware Tools hash and signature are used
to verify the ISO file authenticity, integrity, and origin.
hash digital signature