VDCI test Flashcards

1
Q

A company has a distributed infrastructure model where each remote office has its own site specific file and application servers. These remote offices are all connected to a central data center through links that have limited bandwidth. The company’s overall objective is to reduce the number of servers at each location to one physical server.

What is the business driver for virtualizing these systems?

Broad network access

A

Broad network access

Operational flexibility

Improved productivity

Consolidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A company has invested in virtualization for all their non-mission critical applications and many mission critical applications. The company now wants to convert their virtualized silos that are still owned by each line-of-business into a true VDC.

What is an important business outcome from this?

A

Dramatic reduction in energy consumption

Reporting for management and chargeback

Workload right-sourcing

Reduction in workforce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is IT’s approach to addressing performance issues during the IT-as-a-Service phase of the Cloud Maturity Model?

A

Investigative

Reactive

Selective

Proactive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company has finished the design for their VDC. They realize that they should also include a few design considerations to prepare them for cloud.

What is a key business reason for the company to build a cloud-based service?

A

Chargeback

Speed and agility

Multi-tenancy

Cost savings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization seeks to solve a business problem by licensing software from a supplier. The supplier contract stipulates that the software will only be supported if it runs on server platforms also provided by that supplier.

What is this an example of?

A

A virtual appliance

A legacy application

Enterprise Application Integration

Vendor lock-in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An application is used by nearly all the employees in an organization to place and track orders, provide customer support, maintain and report on financials, and track product defects.

The application was written by the organization’s IT Department 10 years ago. The IT staff actively maintains it and adds features on a regular basis.

What is this an example of?

A

Vendor lock-in

Service-oriented architecture

An enterprise application

A legacy application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An application is designed with reusable modules that can be called by other applications as needed.

What is this an example of?

A

EAI via Mesh

EAI

SOA

ESB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which is a valid method for modifying an application environment to support more clients and increased data throughput?

A

Migrate the application from SAS to NL SAS storage

Vertically scale by adding more nodes

Horizontally scale by adding more nodes

Migrate the application from SSD to SAS storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A database application is developed in-house. It is prepackaged with all supporting software and an operating system. It is configured to run on a specific hypervisor. The administrator must import it into the VDC environment, and then perform minimal configuration tasks. Once installed, this application will allow rapid scaling of a specific business problem in the organization.

What is this an example of?

A

A web application

A legacy application

A thin appliance

A virtual appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An organization supporting 10,000 desktop PCs is considering implementing VDI. What is a benefit of moving forward with a VDI plan?

A

No change in desktop management methods and tools

Standardization of desktop environments

Immediate cost savings

Reduced impact on network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which application virtualization architectures usually require the use of a packager to prepare the application for deployment?

A

Presentation, thick install

Streaming, presentation

Thick install, thin install

Thin install, streaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a benefit of client-side application virtualization?

A

All applications can be virtualized, providing flexibility and management control of client-side applications

Simplification and standardization of patch management is achieved

Reduced overall complexity in the application and desktop environment is achieved

The same management tools used for standard application management can be used to manage virtualized client-side applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An organization uses Linux desktops, laptops, and servers for their primary infrastructure. The company has a business need to run a mission critical application that is only available for the Microsoft Windows operating system. This application and associated data need to be available to 10-12 users.

Which solution would best meet their needs, and why?

A

VDI, because it offers a lower cost per user than RDS

RDS, because it offers true user segmentation

RDS, because it provides better fault tolerance

VDI, because it provides better fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An organization plans to migrate several non-critical applications from a traditional, physical infrastructure to their new servers. This will be the pilot phase for their VDC migration. The VDC migration is planned to be completed over the next 2-3 years.

The project is well funded and has the complete backing of senior management. The organization has retained an experienced consulting service to help them build a detailed migration plan.

Which migration strategy will they most likely use and why?

A

A forklift approach, because this allows them to re-purpose the old servers and add those resources to the new VDC

A phased approach, because they are replacing whole systems at one time and have access to consultants to provide extensive planning for the migration

A forklift approach, because they can keep the old systems running in parallel and they have the funding to maintain this state for a period of time

A phased approach, because they have good funding and executive support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which represents the contractual agreement between the service provider and the business?

A

Non-binding user contract

Terms of service

Service-level agreement

End-user license agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are elements of governance?

A

Adherence to regulations, industry-aligned
Policy definition, separation of duties

Change management, adherence to regulations

Change management, configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What should be the guiding principle of data ownership when using a service provider?

A

The business only owns the data that they store on the system

The business shares ownership with the service provider depending on the type of data

The service provider owns all the data that the business places on its service

The business owns the data no matter where it is placed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Patriot Act is a law that, under special circumstances, allows warrantless search and seizure of information. Which environment presents the highest risk to corporate information given the Patriot Act?

A

Private VDC

Multi-tenant private cloud

Multi-tenant public cloud

Virtualized service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the correct order of steps in the recommended risk assessment process?

A

12345

Full risk assessment

12345

Deploy

12345

Mitigation

12345

Evaluate

12345

Quick risk (L/M/H) check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why is there a need for a full risk assessment if a quick risk assessment has already been performed?

A

A full assessment can help find operational exposures after implementation

A full assessment is always executed by internal auditing

A full assessment details all the exposures in high value/high risk assets

A full assessment is usually conducted by a third party to get an unbiased version of the risk profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A company has asked you to develop a framework for assuring trust in the VDC. An assessment methodology is to be part of the framework.

Where should you look first for assessment criteria and methodologies?

A

Internal IT department

International standards bodies

Company mandate documents

Industry best practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What could delay a virtualization or cloud initiative?

A

Improper asset valuations

Risk assessments

Compliance concerns

Failed audits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is (are) included in internal and external attestation?

A

SSAE 16 assessment

Internal and external audits

IT and service provider audits

27002 risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An administrator has implemented a hypervisor cluster with high availability enabled. They are expecting that if any of the physical servers fail, the virtual servers will be transparently migrated to other hypervisors in the cluster.

When the first hypervisor failure occurs, all of the hosted virtual servers appear offline to users as they are moved to another host.

Which feature should the administrator have implemented to achieve their goal?

A

Online Migration

Fault Tolerance

Load Balancing

Resource Pooling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A company wants to ensure that their critical application can fail over to another physical host within the cluster without disruption.

Which feature should be utilized?

A

High Availability

Resource Pooling

Online Migration

Fault Tolerance

26
Q

company has three hypervisor hosts in a cluster. They need to configure the virtual machines to restart automatically on an alternate host if the original host becomes unavailable.

Which service should be configured on the cluster?

A

Resource Pooling

Online Migration

Load Balancing

High Availability

27
Q

Applications of different criticality have been deployed on a collection of virtual servers. In an effort to save cost, a business continuity plan has been devised to provide half the number of physical servers to host the virtual machines at the disaster recovery site.

What is a likely outcome if a disaster were to occur at the primary site?

A

Application URLs could not be resolved

Application data would be lost

Application performance would be degraded

Data would not be available to applications

28
Q

You require low processing overhead on the hypervisor from backup. Which backup solution(s) should you consider?

A

VM-based backup and image-based backup

Image-based backup and storage-based backup

VM-based backup only

Storage-based backup only

29
Q

A company is planning the backup strategy to be used after migrating separate physical systems into a consolidated virtual machine environment. They are considering migrating their existing traditional backup model into this virtual environment.

Where do the backup data collection operations occur?

A

On the storage array

On the SAN switch

On the virtual machine

On a separate host

30
Q

When selecting a hypervisor, which condition would favor choosing Xen?

A

Every guest VM is required to run an unmodified operating system

All virtualized applications are layered on Microsoft Windows operating systems

A full virtualization approach is desirable

All virtualized applications are layered on Linux and OpenBSD

31
Q

You are planning to deploy a virtualized application in a high-availability configuration with automated VM restart on a hypervisor cluster. Your sizing estimates show that peak workload conditions will saturate the processing power of five hypervisor servers.

To meet the SLA, N+1 redundancy is required on the hypervisor servers, with server utilization not to exceed 85% under any conditions.

What is the minimum number of nodes that you should configure in the hypervisor cluster?

A

5

6

7

8

32
Q

In which situation should you consider implementing a non-overprovisioned hypervisor design?

A

Tier-1 applications are not virtualized

A high degree of server consolidation is a critical goal

Multiple applications with peak workload times that do not overlap

Applications requiring guaranteed performance and availability

33
Q

In a non-virtualized environment, what is the primary problem with attempting consolidation by deploying multiple applications per server?

A

Underutilized resources and increased server sprawl

Incompatibility between drivers and libraries across applications

Increased risk of security breaches

Compromised availability of applications

34
Q

What is a feature of the Cisco Unified Computing System (UCS)?

A

Layer 3 routing optimization

CMDB maintenance utilities

Fabric reconfiguration services

Stateless hardware identity

35
Q

A VDC environment will be deployed with several virtual machines (VMs). The datastores for the VMs will be hosted on a storage array. Array-based local replication has been proposed as the BC/DR solution. Restore granularity will be at the individual VM level.

What is the simplest data layout that would meet this requirement?

A

An individual LUN for each virtual disk

An individual LUN for all virtual disks of each VM

A single large LUN for all virtual disks

All virtual disks on the boot LUN of the hypervisor

36
Q

A tenant of your service provider/hosting company requires that their data be completely isolated from other tenant data.

Which implementation would best meet the tenant’s requirement?

A

Shared ports with dedicated pools

Separate ports with dedicated pools

Shared pools with separate LUNs

Separate ports with dedicated LUNs

37
Q

You are using virtual (thin) provisioning to reduce the amount of physical storage that is initially required for an implementation.

On the storage array, you configure a pool that contains 10 TB of physical storage and then define several LUNs that total 50 TB. These LUNs are presented to several hypervisor clusters. Virtual Machines are subsequently created using a thick format for the virtual hard disks.

What is the maximum capacity that can be allocated for VM hard disks in this configuration?

A

10 TB

50 TB

60 TB

500 TB

38
Q

As part of a VDC deployment, you are examining the existing storage configurations. On one storage system, you discover over fifty storage pools. The pools contain a single type of drive (SSD, SAS or NL SAS), but many of them contain only a few drives and share the same RAID configuration. The Storage Administrator admits that they have been creating separate pools for each application because they did not want the applications contending for the disks.

As part of the design, you propose to consolidate the existing pools into larger pools of mixed drive types and RAID configurations.

What technology will you need to implement to utilize the new pool design?

A

Storage Virtualization

Caching Tier

Virtual Provisioning

Storage Tiering

39
Q

A small law firm that does not currently have any virtualization technologies implemented has recently merged with another firm of approximately the same size. They are planning to consolidate into a single location. They have decided to virtualize their servers and they would like to consolidate storage.

The current storage utilization is below 60%. The budget will not allow them to purchase an array that matches the capacity of the current storage. However, they cannot justify the application disruption associated with growing storage over time to meet forecasted capacity requirements.

Which array feature would meet their requirements?

A

Virtual Pooling

Virtual Provisioning

Vertical Tiering

Virtual LUN

40
Q

A company has five heterogeneous storage arrays that are all connected to a common SAN environment. They want to offer storage to their end users, masking the identity of the target storage so the users cannot tell which storage system they are using.

Which virtualization technique would work in this environment?

A

File-level storage virtualization

Distributed virtualization

Hadoop HDFS

Block-level storage virtualization

41
Q

A VDC administrator needs to create a virtual distributed file system. Which file storage protocol would best meet their requirement?

A

NFS

NTFS

pNFS

iSNS

42
Q

You are designing the storage environment for a new VDC. The applications have been classified into three groups, as shown in the exhibit. You have chosen to create a storage pool for each application group.

How should you configure the storage for each pool to meet the performance and capacity requirements, while minimizing costs?

A

Pool 1 - SSD and SAS drives with storage tiering
Pool 2 - SAS and NL SAS drives with storage tiering and cache tiering
Pool 3 - SAS and NL SAS drives with storage tiering and cache tiering

Pool 1 - SSD and SAS drives with storage tiering
Pool 2 - SSD and NL SAS drives with storage tiering
Pool 3 - SAS drives with cache tiering

Pool 1 - SSD and SAS drives with storage tiering
Pool 2 - SAS and NL SAS drives with storage tiering and cache tiering
Pool 3 - NL SAS drives with cache tiering

Pool 1 - SSD and SAS drives with storage tiering and cache tiering
Pool 2 - SAS and NL SAS drives with storage tiering and cache tiering
Pool 3 - NL SAS drives with cache tiering

43
Q

You are meeting with the CIO to discuss your VDC design. They question the amount of capital that is being invested in iSCSI adapters. They state that, because of the number of adapters required, it is more cost-effective to purchase 10 Gigabit Ethernet NICs and use the integrated hypervisor software stack.

What effect will this have on the design

A

Smaller form-factor hypervisors will be required

Larger form-factor hypervisors will be required

More hypervisors will be required

Fewer hypervisors will be required

44
Q

You have decided to pursue a “scale-out” approach instead of a “scale-up” approach to storage. What is the fundamental tradeoff that you have made?

A

Improved availability versus unlimited scalability

Ease of storage tiering versus unpredictable performance

Higher application throughput versus degraded response time

Complexity of management versus limited scalability

45
Q

Which is a scale-out NAS solution that can distribute data over multiple nodes for resiliency?

A

EMC Symmetrix VMAX

EMC VNX

EMC Isilon

EMC VPLEX

46
Q

An architect is designing a VDC network environment, and is concerned about the overhead introduced by the Spanning Tree Protocol. The environment will have approximately 50 VLANs configured. Each access layer switch will support all of the VLANs.

Which Spanning Tree Protocol should the architect specify for this implementation?

A

MSTP

PVST

STP

RSTP

47
Q

You are adding a non-critical test environment to the compute layer of a VDC, and need to add more access layer switches to provide connectivity to the hypervisors. However, there are no available ports on the two aggregation layer switches to accommodate the uplink connections from the new access layer switches. All uplinks are active and operating at 95% of capacity.

Your design must satisfy all the following requirements:

  • Expand the access layer
  • Minimize capital expenditure
  • Maintain the performance of the existing environment

The CIO has authorized you to purchase additional aggregation layer switches if needed.

What should you recommend?

A

Purchase two new aggregation layer switches
Connect the new access layer switches to them

Purchase one new aggregation layer switch
Connect the new access layer switches to it

Purchase two new aggregation layer switches
Aggregate them into a virtual switch
Connect the new access layer switches to them

Purchase one new aggregation layer switch
Aggregate it with the existing switches
Redistribute all access layer switches across all aggregation layer switches

48
Q

A small college asks you to design a VDC that will span four data centers located within a campus environment. They want to have the VLANs stretched across all four locations. They also require stretched clusters spanning pairs of data centers.

Which distance networking technology would most cost effectively address their requirements?

A

CWDM

MPLS

DWDM

Dark Fiber

49
Q

You are designing a new VDC and are planning to use iSCSI for storage connectivity from the hypervisors. The network infrastructure is 10 Gigabit Ethernet, and the hypervisor hardware can support only two NICs.

Your networking design on the hypervisor must provide the highest level of performance, security, and fault tolerance. What should you recommend?

A

Leave the NICs independent and connect them to different aggregation layer switches
Configure a separate VLAN for iSCSI traffic on each NIC

Bond the NICs together and connect them to different access layer switches
Configure a separate VLAN for the iSCSI traffic

Leave the NICs independent and connect them to different access layer switches
Configure a separate VLAN for iSCSI traffic on each NIC

Bond the NICs together and connect them to different aggregation layer switches
Configure a separate VLAN for the iSCSI traffic

50
Q

A VDC design requires 300 blade server chassis, each with two embedded Fibre Channel switches, which are connected to two separate SAN fabrics. All of the blade chassis FC switches are configured in NPV mode, and the SAN core switches are configured in NPIV mode.

Where can the administrator make zoning changes?

A

Blade chassis only

SAN core or storage edge

SAN core only

Blade chassis or SAN core

51
Q

You are configuring the SAN environment of a VDC using switches with a Switch on a Chip architecture. A high I/O hypervisor is connected to Port 1 on the switch.

Where should you make the ISL connection to provide the lowest latency?

A

Port 4

Port 5

Port 8

Port 20

52
Q

You need to determine the number of CNAs needed on a hypervisor. Bandwidth requirements for applications running on the hypervisor are:

  • Average SAN Bandwidth: 20 Gb/s
  • Average LAN Bandwidth: 10 Gb/s

What is the minimum number of dual-port CNAs you would need to install in the server to meet bandwidth requirements while providing CNA redundancy?

A

1

2

3

4

53
Q

You are designing a VDC that uses converged networking to support both LAN and SAN traffic. FCoE is used exclusively for storage access. The access and aggregation layer switches that have been chosen support both 10 and 40 Gigabit Ethernet and Data Center Bridging.

You have determined that the traffic between the access layer and aggregation layer switches is:

  • Average SAN (FCoE) – 60 Gb/s
  • Average LAN (Ethernet) – 100 Gb/s
  • Burst SAN (FCoE) – 80 Gb/s
  • Burst LAN (Ethernet) – 130 Gb/s

The port channeling technology you are using requires that channels be configured with even numbers of links. Performance cannot be degraded due to a failure of a single switch.

Which port configuration would support the average and burst traffic between the access and aggregation layer switches?

A

Four 40 Gb/s ports and six 10 Gb/s ports

Four 40 Gb/s ports and eight 10 Gb/s ports

Six 40 Gb/s ports

Six 40 Gb/s ports and two 10 Gb/s ports

54
Q

What is a key advantage of Cisco SME relative to other encryption products?

A

Can leverage RSA Key Manager for key management

Can offload encryption processing to hosts

Can offload encryption processing to both hosts and storage arrays

Provides a data encryption solution for disk or tape storage

55
Q

As part of a VDC design, you configured a number of virtual machine OS clusters. Each cluster must have a non-routable network to accommodate system heartbeats. However, some of the clusters house sensitive data that should not be accessible by any other cluster. For performance purposes, the cluster nodes will always be hosted on the same hypervisor.

How should you instruct the administrator to configure the Private VLANs?

A

Configure the Primary and Community VLANs on both the hypervisor virtual switches and access layer switches

Configure the Primary and Isolated VLANs on the hypervisor virtual switches

Configure the Primary and Community VLANs on the hypervisor virtual switches

Configure the Primary and Isolated VLANs on both the hypervisor virtual switches and access layer switches

56
Q

Which mode of IPSec encrypts only the payload of the IP packet?

A

Trusted

Transparent

Transport

Tunnel

57
Q

Which cloud deployment model would most likely be implemented in an “on demand” or “pay as you go” environment?

A

Community

Hybrid

Public

Private

58
Q

Encryption technology

Storage virtualization

Integrated development environment

Management tools

Review Later

Comments

A

Encryption technology

Storage virtualization

Integrated development environment

Management tools

59
Q

A company is considering converting their VDC to IaaS. They realize to do this they will also have to implement several new technologies and create several new functions: service operations and service management. Previously the organization thought they were service oriented because they had a service desk in IT to provide support.

Which key area(s) of investment is required for successful transition to IaaS?

A

Service level agreements with the lines of business

An expanded help desk that includes more comprehensive reporting

Dynamic capacity planning and centralized management

ITIL-based, standardized service templates

60
Q

A software manufacturer is planning to convert their VDC to IaaS. As part of the transformation to IaaS the company realizes they have to make several organizational changes.

Which is the most likely starting point for their organizational transformation?

A

Align GRC and Trust requirements

Create new service based roles in the lines of business

Cross train IT operations and delivery personnel

Obtain executive and organizational buy-in