VDCI test Flashcards
A company has a distributed infrastructure model where each remote office has its own site specific file and application servers. These remote offices are all connected to a central data center through links that have limited bandwidth. The company’s overall objective is to reduce the number of servers at each location to one physical server.
What is the business driver for virtualizing these systems?
Broad network access
Broad network access
Operational flexibility
Improved productivity
Consolidation
A company has invested in virtualization for all their non-mission critical applications and many mission critical applications. The company now wants to convert their virtualized silos that are still owned by each line-of-business into a true VDC.
What is an important business outcome from this?
Dramatic reduction in energy consumption
Reporting for management and chargeback
Workload right-sourcing
Reduction in workforce
What is IT’s approach to addressing performance issues during the IT-as-a-Service phase of the Cloud Maturity Model?
Investigative
Reactive
Selective
Proactive
A company has finished the design for their VDC. They realize that they should also include a few design considerations to prepare them for cloud.
What is a key business reason for the company to build a cloud-based service?
Chargeback
Speed and agility
Multi-tenancy
Cost savings
An organization seeks to solve a business problem by licensing software from a supplier. The supplier contract stipulates that the software will only be supported if it runs on server platforms also provided by that supplier.
What is this an example of?
A virtual appliance
A legacy application
Enterprise Application Integration
Vendor lock-in
An application is used by nearly all the employees in an organization to place and track orders, provide customer support, maintain and report on financials, and track product defects.
The application was written by the organization’s IT Department 10 years ago. The IT staff actively maintains it and adds features on a regular basis.
What is this an example of?
Vendor lock-in
Service-oriented architecture
An enterprise application
A legacy application
An application is designed with reusable modules that can be called by other applications as needed.
What is this an example of?
EAI via Mesh
EAI
SOA
ESB
Which is a valid method for modifying an application environment to support more clients and increased data throughput?
Migrate the application from SAS to NL SAS storage
Vertically scale by adding more nodes
Horizontally scale by adding more nodes
Migrate the application from SSD to SAS storage
A database application is developed in-house. It is prepackaged with all supporting software and an operating system. It is configured to run on a specific hypervisor. The administrator must import it into the VDC environment, and then perform minimal configuration tasks. Once installed, this application will allow rapid scaling of a specific business problem in the organization.
What is this an example of?
A web application
A legacy application
A thin appliance
A virtual appliance
An organization supporting 10,000 desktop PCs is considering implementing VDI. What is a benefit of moving forward with a VDI plan?
No change in desktop management methods and tools
Standardization of desktop environments
Immediate cost savings
Reduced impact on network infrastructure
Which application virtualization architectures usually require the use of a packager to prepare the application for deployment?
Presentation, thick install
Streaming, presentation
Thick install, thin install
Thin install, streaming
What is a benefit of client-side application virtualization?
All applications can be virtualized, providing flexibility and management control of client-side applications
Simplification and standardization of patch management is achieved
Reduced overall complexity in the application and desktop environment is achieved
The same management tools used for standard application management can be used to manage virtualized client-side applications
An organization uses Linux desktops, laptops, and servers for their primary infrastructure. The company has a business need to run a mission critical application that is only available for the Microsoft Windows operating system. This application and associated data need to be available to 10-12 users.
Which solution would best meet their needs, and why?
VDI, because it offers a lower cost per user than RDS
RDS, because it offers true user segmentation
RDS, because it provides better fault tolerance
VDI, because it provides better fault tolerance
An organization plans to migrate several non-critical applications from a traditional, physical infrastructure to their new servers. This will be the pilot phase for their VDC migration. The VDC migration is planned to be completed over the next 2-3 years.
The project is well funded and has the complete backing of senior management. The organization has retained an experienced consulting service to help them build a detailed migration plan.
Which migration strategy will they most likely use and why?
A forklift approach, because this allows them to re-purpose the old servers and add those resources to the new VDC
A phased approach, because they are replacing whole systems at one time and have access to consultants to provide extensive planning for the migration
A forklift approach, because they can keep the old systems running in parallel and they have the funding to maintain this state for a period of time
A phased approach, because they have good funding and executive support
Which represents the contractual agreement between the service provider and the business?
Non-binding user contract
Terms of service
Service-level agreement
End-user license agreement
What are elements of governance?
Adherence to regulations, industry-aligned
Policy definition, separation of duties
Change management, adherence to regulations
Change management, configuration management
What should be the guiding principle of data ownership when using a service provider?
The business only owns the data that they store on the system
The business shares ownership with the service provider depending on the type of data
The service provider owns all the data that the business places on its service
The business owns the data no matter where it is placed
The Patriot Act is a law that, under special circumstances, allows warrantless search and seizure of information. Which environment presents the highest risk to corporate information given the Patriot Act?
Private VDC
Multi-tenant private cloud
Multi-tenant public cloud
Virtualized service provider
What is the correct order of steps in the recommended risk assessment process?
12345
Full risk assessment
12345
Deploy
12345
Mitigation
12345
Evaluate
12345
Quick risk (L/M/H) check
Why is there a need for a full risk assessment if a quick risk assessment has already been performed?
A full assessment can help find operational exposures after implementation
A full assessment is always executed by internal auditing
A full assessment details all the exposures in high value/high risk assets
A full assessment is usually conducted by a third party to get an unbiased version of the risk profile
A company has asked you to develop a framework for assuring trust in the VDC. An assessment methodology is to be part of the framework.
Where should you look first for assessment criteria and methodologies?
Internal IT department
International standards bodies
Company mandate documents
Industry best practices
What could delay a virtualization or cloud initiative?
Improper asset valuations
Risk assessments
Compliance concerns
Failed audits
What is (are) included in internal and external attestation?
SSAE 16 assessment
Internal and external audits
IT and service provider audits
27002 risk assessment
An administrator has implemented a hypervisor cluster with high availability enabled. They are expecting that if any of the physical servers fail, the virtual servers will be transparently migrated to other hypervisors in the cluster.
When the first hypervisor failure occurs, all of the hosted virtual servers appear offline to users as they are moved to another host.
Which feature should the administrator have implemented to achieve their goal?
Online Migration
Fault Tolerance
Load Balancing
Resource Pooling