Windows Server Virtualization Flashcards
What is a key characteristic of a box-by-box configuration in traditional networking?
A) Centralized control plane
B) Each device must be configured separately
C) Automated configuration updates
D) Cloud-based management
B) Each device must be configured separately
Explanation: In a box-by-box configuration, each device must be configured separately, and troubleshooting and updates must also be done individually for each device.
What is a server in the context of networking?
A) A physical device that provides network services to client devices
B) A software application for managing databases
C) A type of network protocol
D) A cloud storage service
A) A physical device that provides network services to client devices
Explanation: A server is an operating system or application that provides network services to client devices and can be located in a physical server, virtualized environment, or cloud.
Question 3: What are the different form factors of a traditional physical server?
A) Tower, Rack, Blade
B) Desktop, Laptop, Tablet
C) Cloud, Virtual, Physical
D) Small, Medium, Large
A) Tower, Rack, Blade
Explanation: Traditional physical servers come in different form factors, including Tower, Rack, and Blade, each designed for specific use cases and environments.
Which of the following is NOT a basic component of a physical server?
A) CPU
B) RAM
C) Network Interface Cards (NICs)
D) Monitor
D) Monitor
Explanation: Basic components of a physical server include CPU, RAM, internal storage (HDD, SSD), and Network Interface Cards (NICs). A monitor is not a basic component of a server.
What is a bare metal server?
A) A server without an operating system
B) A virtual machine
C) A cloud-based server
D) A server with pre-installed applications
A) A server without an operating system
Explanation: A bare metal server is a physical server without an operating system. For it to be a full-fledged server, it needs an operating system installed.
Which of the following is a type of attack that can target servers?
A) Phishing
B) Denial of Service (DoS)
C) Man-in-the-Middle (MitM)
D) All of the above
D) All of the above
Explanation: Servers can be targeted by various types of attacks, including Phishing, Denial of Service (DoS), and Man-in-the-Middle (MitM) attacks.
What is server virtualization?
A) Installing multiple operating system instances on a physical server
B) Creating a physical server from virtual machines
C) Using cloud services for storage
D) Connecting multiple servers in a network
A) Installing multiple operating system instances on a physical server
Explanation: Server virtualization involves installing multiple operating system instances on a physical server (called Host) by creating Virtual Machines (VMs), allowing multiple VMs to run on a single Host.
What is the role of a hypervisor in server virtualization?
A) To create and run Virtual Machines (VMs)
B) To manage network traffic
C) To provide antivirus protection
D) To store data in the cloud
A) To create and run Virtual Machines (VMs)
Explanation: A hypervisor is software that creates and runs Virtual Machines (VMs) and manages and allocates the host hardware components for each VM.
What are the two types of hypervisors?
A) Type 1 and Type 2
B) Type A and Type B
C) Primary and Secondary
D) Local and Remote
A) Type 1 and Type 2
Explanation: There are two types of hypervisors: Type 1 (Native/Bare Metal) and Type 2 (Hosted).
Which of the following is an example of a Type 1 hypervisor?
A) VMware ESXi
B) VirtualBox
C) VMware Workstation
D) Parallels Desktop
A) VMware ESXi
Explanation: Type 1 hypervisors, also known as Native/Bare Metal hypervisors, are installed directly on top of the bare metal device hardware. Examples include VMware ESXi, Hyper-V, Linux KVM, and Citrix XenServer.
What is a Type 2 hypervisor?
A) A hypervisor installed directly on hardware
B) A hypervisor installed on top of the host operating system
C) A cloud-based hypervisor
D) A network management tool
B) A hypervisor installed on top of the host operating system
Explanation: Type 2 hypervisors, also known as Hosted hypervisors, are installed on top of the host operating system and manage virtual machines within that environment.